In the wake of eBay's recent data breach, many consumers and security professionals have been extremely vocal in their protest of the company's response to the situation; some are calling it one of the worst corporate crisis responses they've ever seen. eBay's stock price in the days after the breach took a major hit, dipping to the lowest since December 2013. When considering the costs of a data breach, damage to company systems, loss of intellectual property, remediation and forensic costs are usually what come to mind. Some organizations also factor in the cost associated with reputation damage, which may harm revenue, as well as industry fines or possible prosecution. Thycotic, a provider of privileged account management solutions for global organizations, has compiled the following list of best practices for mitigating data breaches and avoiding the costly headaches associated with them.
Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end users. An Inc. 5000 company, Thycotic is recognized as the fastest growing privileged management vendor in IT security and one of the top 30 fastest growing companies headquartered in Washington, D.C.
Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ... More >>
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>