Smart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure If, unlike enterprise customers, you don’t have six figures to spend, what are some things you can do to protect your data that can scale as your business grows? Even if you don’t plan on scaling to an IPO, but are looking for good, solid privacy tech on the cheap, here are five ideas to help. Multifactor authentication (aka MFA) You don’t have to go crazy here to get
Simply put, Data Protection refers to the need for important information to be safeguarded from corruption, compromise or loss.
You are probably wondering whatever happened to the good old days, when all a business had to do was to make deals, pay their creditors and grow.
If dealing with the specter of ransomware, DDoS attacks and cyryptominers weren’t enough of a headache, since May 25, 2018, you’ve also got to protect your clients’ data and your own business-critical d
What are the main types of backup operations and how can you avoid the sinking feeling that comes with the realization that you may not get your data back? As humanity’s use of all kinds of technology has grown, terms like backup are no longer unfamiliar to the majority of people. Of course, the concept of a backup existed long before it came to be named as such. Whenever any important document or information was copied and stored in a place separate from the original for the
Security breaches have become a weekly occurrence in the news cycle, which has caused businesses to start asking questions. How are they happening? Is my business at risk? The short answer is yes, your business is at risk. Here’s an overview on how data breaches occur, why they’re on the rise, and what steps to take now to protect your business. Learn how data breaches occur, why they are on the rise, and what steps to take now to protect Data breaches can be broken down into
A week after the global outbreak of WannaCryptor, also known as WannaCry, another ransomware variant has been making the rounds. Detected by ESET as Win32/Filecoder.AESNI.C, and also known as XData ransomware, the threat has been most prevalent in Ukraine, with 96% of the total detections between May 17th and May 22th, and peaking on Friday, May 19th. ESET has protected its customers against this threat since May 18th. However, we’ve been tracking the malware since December 8
When it comes to cybercrime, it’s easy to imagine that the biggest threat to your company is external. However, more and more companies are realizing that trusted and trained employees can also pose an enormous threat. Indeed, a recent report by Haystax Technology discovered that 74% of organizations questioned “feel vulnerable to insider threats,” with 56% of security professionals certain that “insider threats have become more frequent” over the past year. While some attack
“Who has access to my data?” If you’ve asked yourself this question and can’t help but feel concerned, you are not alone. According to a National Cyber Security Alliance study from 2016, more than 90% of American internet users worry to some extent about their data privacy. For almost 70% of the surveyed Americans, their number one concern is the lack of control over the information they have posted online. Even more so with regard to social media: an alarming 96% of responde
Fines by the UK’s Information Commissioner’s Office (ICO) for security breaches have been a matter of discussion for some time. For most, they seem fairly small; and if we think about the actual monetary value when compared to a large company’s earnings, they are. The ICO is an independent authority set up to uphold information rights in the public interest. They have issued some fairly substantial fines that have included – but are not limited to – record fines of £400,000 f
Found a new girlfriend or boyfriend? Share. Had a blast on vacation? Share. Cooked a tasty dinner? Share. Got a new passport? Share. Share. Share. Is this routine familiar to you? If so, be very careful: you might well be oversharing. This kind of behavior is typical of young people who have grown up with computers, proliferating technology and emerging social networks. Thanks to their urge to share every detail of their lives, they’ve been dubbed the ‘Selfie’ or ‘Me, Me, Me’