Please turn on your JavaScript for this page to function normally.
User
Human behaviour still the biggest threat to company security

Nuix, a security intelligence and information management technology company, had in-depth conversations with chief information security officers and directors from Fortune 500 …

Inside job: 6 ways employees pose an insider threat

CISOs and CIOs have seen the prospects of losing control over data and the accompanying data privacy and security concerns as the biggest hurdle to cloud adoption. According …

Strong passwords don’t matter if employees don’t secure them

The line between personal and professional use of apps and devices continues to blur, and while employees claim to prioritize online security, data fro Ping Identity shows …

75% of companies experienced a fraud incident in the past year

Three quarters of companies (75%) have fallen victim to a fraud incident in the past year, a rise of 14 percentage points in just three years, according to Kroll.The findings …

Mobile users continue to put personal and corporate data at risk

Blancco Technology Group surveyed over 1,400 mobile users in the United States, Canada, UK and Australia, and found that inadequate security precautions taken by mobile users …

Most employees are not malicious, but their carelessness can be just as damaging

The results of a new Loudhouse survey show a disconnect between employees and IT within an organization with 73 percent of U.S. employees believing their company provides …

Social experiment: 200 USB flash drives left in public locations

Nearly one in five people who found a random USB stick in a public setting proceeded to use the drive in ways that posed cybersecurity risks to their personal devices and …

The average organization experiences 9 insider threats each month

After analyzing actual cloud usage across over 23 million employees, Skyhigh Networks uncovered how user behaviours put companies at risk and how catching and managing this …

Attackers posing as legitimate insiders still an enormous security risk

Cyber attacks that exploit privileged and administrative accounts – the credentials used to manage and run an organization’s IT infrastructure – represent the greatest …

How to avoid data breaches? Start by addressing human error

Small businesses in the UK are failing to train staff on how to correctly identify and dispose of confidential information which could lead to a costly data breach.A Shred-it …

Why background screening is vital for IT security

Which security controls are the most important in thwarting cyber crime against businesses? Anti-malware? Physical security? According to a recent survey, people are a main …

The insider versus the outsider: Who poses the biggest security risk?

Today, many organizations are under continuous attack from nation-states or professional cyber criminals. One of the main focuses for IT security teams is stopping intruders …

Don't miss

Cybersecurity news