Near the end of 2015, enSilo announced the discovery of a critical security vulnerability affecting various AV software products. This was a critical security vulnerability that could potentially turn AV software into an "attacker-enabler tool." Does this mean that AV software, like username/password combinations, has peaked as a security source? Sue Marquette Poremba says:
"Yes and no. Like passwords, AV software isn't going anywhere any time soon. It is a mainstay in our security setup, especially so for those who are focused on protecting individual devices and not entire networks. But I think there is a shift happening, as the protection becomes more concentrated on protecting data. Endpoint security is the more pragmatic response."
Your company's data — client information, payment information, personal files, bank account details — is always at risk of falling into the wrong hands. And every day, security threats seem to come from a new place.
In this slideshow, we have collected some of the best advice that leading security experts have shared with IT Business Edge recently, identifying areas of data vulnerability and helping you develop strategies for securing your data and information systems.
Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ... More >>