Retailers and ecommerce organizations are responsible for handling a wealth of customer data, including Personally Identifiable Information (PII) such as names, addresses, credit card details and passwords.
However, this access to customer data makes retailers one of the biggest target groups for cybercriminals....
Website breaches are becoming a daily occurrence. Organizations, entrusted with millions of customer data points, are failing to protect consumers adequately and as a consequence, losing valuable data.
Despite the expectation that companies should be prepared for both accidents and deliberate attacks, there is a...
2018 saw a further increase in the frequency and complexity of cyberattacks being levelled at organizations and in several cases, resulted in high-profile customer data breaches. Global companies such as Facebook, Uber and Quora all fell victim to cyberattacks that left them facing huge financial costs and...
New Ensighten research shows 83% of global organizations anticipate a potential data breach - yet two-thirds are not armed for prevention against this cyber threat. The risks revealed by this research into these concerning approaches to data security vulnerabilities cannot be allowed to persist, lest they threaten...
Sensitive information, including credit card and phone numbers, was left exposed to the internet on an unsecured database belonging to Fieldwork Software, which provides cloud-based services to small businesses, researchers note in a new report.
What makes detecting compromised devices so difficult? The risk of a breach is higher than ever, with countless examples ending up in the news. So how do we detect these infected endpoints faster?
This guide seeks to answer this question and explore the obstacles in identifying infections.
Computol is a technology provider with nearly 40 years of experience
providing network management and data protection services. Today, the MSP
manages these services for more than 30 clients across the USA, protecting
29 TB of data in the cloud alone.
In order to exceed their clients' needs, Computol's team of IT...
Upgrading to a new OS can be a significant headache for IT teams, taking
up a lot of man-hours and IT budgets. Since there is no automatic in-place
upgrade to transition from Win7's 32-bit to Win10's 64-bit version, the
migration process can be extremely time-consuming - involving multiple
manual steps that can...
Microsoft solutions are everywhere, processing a lot of
valuable data daily. But because protecting this asset
falls to unaware customers, it is common to hear about
data loss incidents which could have been avoided.
Data protection is essential: Hardware failure, user
error, malware and unavailability of cloud...
Despite everything you've spent on data-centric security, there still is a security gap that is burgeoning at an alarming rate when it comes to protecting sensitive data. The growing complexity of users outside your organisation, methods of sharing information, and the number of devices data reside on are continually...
Australian security expert Troy Hunt says an 87 GB compilation of username and password combinations - drawn from more than 2,000 databases - includes 773 million unique email addresses for apparent use in credential-stuffing attacks. Takeaway: Use a unique password for every site, or else.
The U.S. Securities and Exchange Commission has charged seven individuals and two organizations with being part of an international scheme that hacked the SEC's EDGAR document system, stole nonpublic corporate information and used it to illegally earn $4.1 million via insider trading.
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
The organization that manages IT for Singapore's public healthcare sector says it has terminated, demoted or financially penalized several employees for their roles in the handling of a 2017 cyberattack on SingHealth, the nation's largest healthcare group. What do U.S. security experts think of these measures?
Forty-three states have reached a settlement with Neiman Marcus over its 2013 data breach, one of several breaches from that period blamed on in-memory malware. The retailer will pay $1.5 million and must use encryption and tokenization to protect card data.