data breach
![shadow](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194957/shadow-400x200.jpg)
Prevent shadow IT: Companies need security covering multiple communication vectors
There is a critical need for companies to adopt comprehensive and secure enterprise communications platforms to prevent shadow IT. It is a phenomenon where employees, to …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
The importance of consumer trust in the second-hand mobile market
58 percent of global consumers have yet to trade in an old mobile device, though almost two-thirds (64%) globally reported they would be willing to do so if more stringent …
![earth](https://img.helpnetsecurity.com/wp-content/uploads/2016/07/09111449/earthspace-400x200.jpg)
2018 saw 6,515 reported breaches, exposing 5 billion sensitive records
There were 6,515 publicly disclosed data compromise events through December 31, 2018, exposing over 5 billion sensitive records, according to Risk Based Security’s Year …
![fire](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105450/fire-400x200.jpg)
Most companies anticipate a critical breach in 2019, CISOs need to prioritize threats
80 percent of IT business leaders anticipate a critical breach or successful cyberattack over the coming year, according to the Cyber Risk Index (CRI), a Trend Micro survey of …
![question](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102504/question-400x200.jpg)
SMBs spending a day each week dealing with cybersecurity issues
Almost half of UK small to medium-sized businesses (SMBs) believe a cyberattack would put their business at risk of closure, and 48 per cent of businesses report they have had …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
88% of UK businesses breached during the last 12 months
The UK’s cyber threat environment is intensifying. Attacks are growing in volume, and the average number of breaches has increased, according to Carbon Black. Key survey …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
There’s a growing disconnect between data privacy expectations and reality
There is a growing disconnect between how companies capitalize on customer data and how consumers expect their data to be used, according to a global online survey …
![Facepalm](https://img.helpnetsecurity.com/wp-content/uploads/2017/06/09104156/facepalm-files-400x200.jpg)
773 million records exposed in massive data breach
Someone has compiled a massive collection of email addresses and plain text passwords, apparently from 2000+ hacked databases, and has made the trove freely available for …
![IoT](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095727/iot-400x200.jpg)
Companies still struggle to detect IoT device breaches
Only 48% of businesses can detect if any of their IoT devices suffers a breach, according to Gemalto. This comes despite companies having an increased focus on IoT security: …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102952/computer-lock-400x200.jpg)
There’s a sizable gap between confidence in security programs and their effectiveness
A Syncsort survey of over 300 respondents found that while 85 percent of respondents are either very or somewhat confident in their organization’s security program, 41 percent …
![jackal](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100237/jackal-400x200.jpg)
The year ahead: More breaches, bolstered regulation and the rise of AI
This time of the year is always exciting for us, as we get to take a step back, analyze how we did throughout the year, and look ahead at what the coming year will bring. …
![Equifax](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103216/equifax-400x200.jpg)
Equifax: A study in accountability but not authority responsibility
Like most of the security community, I have spent hours digesting the recently released U.S. House of Representatives Committee on Oversight and Government Reform report on …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)