Businesses can avoid or reduce the impact an attack has on their company if they use the correct cloud strategy when controlling their security. Technical security must be accompanied by organisational & personnel measures.
Late last year SC Media UK finally met someone confident that their organisation is GDPR compliant, ready for the new regulations coming into force in May: Stephen Schmidt, CISO, Amazon Web Services (AWS).
In less than six months, the GDPR will transform how organisation are able to use, store and share consumer data. This impacts every industry, but the already heavily-regulated healthcare sector will be hit particularly hard.
The 'CIA' approach - Confidentiality, Integrity, Availability - is regarded as the pinnacle of data security. Of these, perhaps the most important component is 'Availability' says Dirk Paessler.
Ten percent of small business owners and employees in the UK admit to having poor security habits. The surveyed individuals admitted to regularly sharing confidential files on personal devices or sending documents to their personal emails rather than work emails.
New research from Wombat provided an analysis of personal security behaviours of UK and US workers that play a big role in securing information, devices and systems both at work and home.
Despite the General Data Protection Regulation (GDPR) coming into effect 12 months from now, the majority of European and US businesses are still inadequately prepared and at risk of incurring costly non-compliance fines.
Code42's latest report says CIOs, CISOs and their IT security teams need to find powerful new solutions that will keep data safe without impeding productivity and causing further risk.
The growing cyber-threat landscape makes protecting sensitive customer and company information vital, and it will only increase with GDPR coming next May.
David Cohen explores the view that, in 2017, layering Is the most effective cyber-security strategy and how becoming an expert at reading data patterns is an integral part of securing the data centre.
New research from Yoti reveals that 87 percent of UK consumers are concerned about how secure their personal information is when shared online.
As per the recent Investigatory Powers Act otherwise known as the "Snooper's Charter", UK intelligence agencies were given the green light to access personal data from browsing histories.
There is a growing need to improve security practices of confidential documents that include information such as financial data, employee records, business contracts and intellectual property.
New research from ChristianSteven Software outlines the results of a survey of more than 500 C-level executives from across Europe and the US.
Identify what data is sensitive to your business, where it resides and how it's being used, or how can you protect it? Getting to grips with data should be the first step in any effective security strategy says Thomas Fischer.
In the run up to the festive shopping season, many employees will have their eyes on a new mobile device or tablet. Richard Stiennon asks, "is your organisation taking the right precautions to avoid a visit from the ghosts of data past?"
Nic Scott discusses how UK businesses can re-evaluate and enhance the security measures they currently have in place in order to avoid potentially crippling fines
Large volumes of employees moving from job to job increases the number of employment records that must be retained by HR departments, stored securely and ultimately destroyed within a legally determined timeframe.
Jon Fielding discusses the need to manage information security at the data level and not simply at the network perimeter.
Jeremy King discusses what businesses can do today to prioritise data security
Ralph Echemendia discusses the best practices for ensuring security of customer data for a contact centre in the cloud
Due to its poor data security, which led to the theft of the personal data of over 150,000 customers last year, TalkTalk has been fined £400,000 by the Information Commissioner's Office (ICO).
Half of all students in the UK have no security software installed on any of their devices, even though a quarter of teenagers are 'almost constantly' connected.
A planned national database of personal data on Russian citizens could become a magnet for criminal cyber-attacks warn analysts.
With only a third of sensitive data in cloud applications being protected by encryption, cloud data security is still a major challenge for companies. Businesses are focusing on basic security techniques such as passwords to protect sensitive and confidential customer information.
Most organisations do not possess confidence in their ability to protect data after experiencing a data breach. One third have experienced a data breach in the past year.
In 2015, the average company had roughly 9.9 million files accessible to every employee regardless of their roles.
The Dell Data Security Report found that 82 percent of IT and business decision makers surveyed have tried to limit employee access to data across their locations,
There is a basic tension when it comes to both securing data and having it readily accessible, and this tension needs to be frequently addressed when considering the sharing of big data both within an organisation and outside it says Ted Dunning.
If they are to limit damaging effects, enterprises must prepare and equip themselves with the proper skills to react to and prevent cyber-attacks.