Data Security : March 2017 Archives

Securing your data and network, inside and outside the perimeter

After 10 Years of Writing About Cloud Security, Concerns Haven’t Changed Much

30 Mar, 2017

Some things haven’t changed much in a decade. The greatest concern in adopting cloud computing remains the security of the data, with 57 percent worried about data loss and 49 percent worried about data privacy. ...More >

Small Businesses Continue to Believe They Aren’t at Risk for a Security Incident

29 Mar, 2017

It is beyond time for SMBs to pay closer attention to their security and avoid becoming part of the statistic of businesses that close because they can’t recover from an incident. ...More >

Why Your Business Must Be Prepared for Security Incidents

27 Mar, 2017

How do you change the mindset of reacting to something that is more proactive and will result in less downtime and fewer man hours to repair the incident? ...More >

Where Is Cybersecurity Headed in 2019?

23 Mar, 2017

Even if we think we know what’s coming, we still aren’t really prepared for it. Our security systems are often built to focus on known attack methods, not for future cybersecurity threats. ...More >

Secret Service Laptop Theft Should Serve as Security Wake-Up Call

20 Mar, 2017

The Secret Service theft is a reminder of how common the disappearance of our devices can be and the risks that are involved. ...More >

Twitter Hack Shows Dangers of Third-Party Access

16 Mar, 2017

Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors. ...More >

Cybersecurity Pros Don’t Trust Federal Government on Security. Will They Trust States?

13 Mar, 2017

Only 17 percent of security pros believe the government is able to protect itself from cyberattacks. Security professionals are also concerned about the rise in nation-state attacks. ...More >

CIA Breach Shows Lack of Security in IoT

09 Mar, 2017

We must discuss the ramification to businesses and their employees and customers: the IoT security risks. ...More >

Breach Fallout Can Linger Years After the Initial Incident

06 Mar, 2017

News about long-running consequences of Yahoo and Gmail breaches should worry IT security professionals. ...More >

Mismatch in Incentives Gives Cybercriminals an Edge

02 Mar, 2017

One of the reasons cybercriminals have the advantage is because the incentives between the attackers and the defenders are mismatched. ...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.