data breach
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Why DDI technology is fundamental for multicloud success
Whether they are handling new applications or managing workloads, cloud and multicloud technologies are critical components of the modern workplace. But the real value of …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Data breaches and network outages: A real and growing cost for the healthcare industry
One year into the COVID-19 pandemic, the Infoblox report reveals major challenges the healthcare industry faced as IT workers scrambled to secure protected health information …
![hole](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112510/hole-400x200.jpg)
The financial impact of cybersecurity vulnerabilities on credit unions
Cybersecurity vulnerabilities among credit unions and their vendors create the potential for large financial impacts to the credit union industry, according to a Black Kite …
![SMS](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/08082100/phone-message-400x200.jpg)
The dangers of misusing instant messaging and business collaboration tools
71% of office workers globally – including 68% in the US – admitted to sharing sensitive and business-critical company data using instant messaging (IM) and business …
![Cybersecurity risk management](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092752/cybersecurity_risk_management-400x200.jpg)
Risk management in the digital world: How different is it?
Managing risk arising from remote work has largely been reactive, and risk managers have had to adapt to new digital threats that weren’t necessarily as prevalent when work …
![people](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/10120129/people-400x200.jpg)
Customers willing to share personal data in exchange for personalized services
There is ample opportunity for financial institutions to harness the power of AI to build more meaningful connections and experiences with customers — vastly improving both …
![email danger](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093149/email-danger-400x200.jpg)
Data is most at risk on email, with 83% of organizations experiencing email data breaches
95% of IT leaders say that client and company data is at risk on email, an Egress report reveals. Additionally, an overwhelming 83% of organizations have suffered data …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105006/hand-400x200.jpg)
Criminals leveraging shift to remote work to develop targeted attacks
Malwarebytes announced the findings of its report which explores how the global pandemic forced many employees to quickly become a remote workforce and confined consumers to …
![shield](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093232/shield1-400x200.jpg)
What behavioral experts can teach us about improving security
The “castle and moat” approach to protecting one’s domain was effective for centuries. At the start of the internet age, when a company’s greatest assets were physically …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/31120744/healthcare-pills-attack-400x200.jpg)
Healthcare breaches increased over 50% in 2020
In 2020, there were 599 healthcare breaches that collectively affected over 26 million individuals. Bitglass’ report takes an in-depth look at the breaches that healthcare …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
57% of vulnerabilities in 2020 were classified as critical or high severity
NIST logged more than 18,000 vulnerabilities in 2020, over 10,000 of which were critical or high severity – an all-time high. Redscan’s analysis looks beyond severity scores, …
![remote work](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/02105451/remote_work-400x200.jpg)
Enable secure remote workspaces without trashing your entire IT infrastructure
Roughly 12 months ago, when the world shifted seemingly overnight to work-from-home, few companies were well-positioned to seamlessly scale their remote work solutions. Legacy …
Featured news
Sponsored
Don't miss
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints