With more activity happening in the cloud and employees more frequently working remotely or from a mobile device, IT pros are constantly challenged to keep data secure. The volume and frequency of data breaches is evidence enough of the risks facing today's businesses. For instance, the Identity Theft Resource Center (ITRC) reports that the number of U.S. data breaches tracked in 2015 was more than 750.
A data breach will certainly have an impact on a company's reputation and credibility. But what are the tangible implications of a data breach? According to an IBM-sponsored study conducted by Ponemon Institute, the average cost paid for each lost or stolen record that contained sensitive and/or confidential information was $154. In a single attack, a hacker could gain access to hundreds of thousands of accounts, the cost of which can add up quickly.
Cybersecurity is a key issue for every business, and outside of large enterprises, most companies have a small IT team charged with managing security, in addition to their other responsibilities. To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. In this slideshow, Joe Siegrist, VP and GM, LastPass, has identified ways IT pros can better manage access and improve user password security practices.
Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ... More >>
Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ... More >>
Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ... More >>