data security

Why virtual desktops make sense for a virtual workforce
Across the country businesses and public agencies alike are holding virtual job fairs and summits and talking about the effects of the virtual workforce. Faced with skilled …

Most employees believe backing up company data is not their problem
Apricorn announced the findings from a Twitter poll exploring data backup and recovery processes. More than 50 percent of respondents noted that they, or their employees, have …

Content sprawl is increasing the risk of data breaches and leaks
Egnyte’s latest report, based on a survey of 400 IT executives, examines the challenges of securing and governing unstructured content in today’s hybrid and remote work …

Leveraging AI and automation to identify sensitive data at scale
In this interview with Help Net Security, Apoorv Agarwal, CEO at Text IQ, talks about the risk of unstructured data for organizations and the opportunity to leverage AI and …

Protecting your company from fourth-party risk
In a world that is becoming ever more interconnected, organizations are learning firsthand that they are not only vulnerable to the adverse events that their vendors …

Hybrid work is here to stay, but security concerns are high
As a rise in variants spurs new uncertainties around the COVID-19 pandemic, businesses around the globe are tasked with developing a long-term plan and work model, whether …

Consumers value privacy more than potential savings when purchasing insurance
A recent survey by Policygenius explored consumer sentiment toward new tech being deployed by home and auto insurance companies. The survey found that most consumers prefer …

Your data, your choice
In 2021, “personal data” is anything but “personal”. We don’t own our personal data and we have limited control over what happens to it. Currently, the onus of responsibility …

Why you need to make Microsoft 365 a 24/7 security priority
It’s easy to take advantage of the Microsoft 365 service, but are you taking the steps to properly secure all the data your company is storing inside of it? For security …

What is the HIPAA Security Rule? Three safeguards to have in place
The past year has catalyzed a new era of healthcare, one where telehealth visits increased as we relied on online communication to keep ourselves informed and healthy. With …

Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …

How businesses use data might not be popular with the public
A KPMG survey reveals a deep disconnect between corporate data practices and the general population’s expectations around transparency and data privacy. As companies collect …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility