Loading...

Follow IT Security Central on Feedspot

Continue with Google
Continue with Facebook
or

Valid

The list of the biggest dangers to information security are long for 2019, and ever-evolving. A 2019 list developed by the Information Security Forum highlighted ransomware hijacking IoT, premeditated internet outages disrupting trade and privileged insiders being coerced into giving up their companies’ critical data as some of the top threats. The recent publication of […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

By now, the incredible cost of a cybersecurity incident is well understood. According to a 2018 study by the Ponemon Institute, the average cost of a data breach approaches $4 million, with cascading opportunity and reputational damage that can far exceed this number. Unfortunately, despite the terrible consequences, data loss events are increasing as the treasure trove of […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

The modern workforce looks a lot different than it did even a decade ago. If employees actually go to a physical office, their workplaces are often defined by open concepts, collaboration and frequent communication. None of this is by accident. Studies consistently show that happy employees are more productive employees, and autonomy and access are two factors […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

How to ensure insider threat prevention with a privacy-friendly business culture Today’s technology landscape is undoubtedly powered by data. It’s the lifeblood of the digital ecosystem, making it at once its most promising asset and its most significant liability. Unfortunately, data breaches are on the rise, data misuse is frighteningly rampant, and few companies have […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Virtually every business in every sector is grappling with the reality that, along with its many benefits, the digital age has numerous hazards and shortcomings – especially when it comes to data protection. Meanwhile, those in the healthcare industry have been aware of this for a long time. Healthcare providers collect copious amounts of their […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

By Isaac Kohen, published in Help Net Security  Companies are increasingly implementing employee and user activity monitoring software to: Ensure data privacy Protect intellectual property and sensitive data from falling into the wrong hands Stop malicious or unintentional data exfiltration attempts Find ways to optimize processes and improve employee productivity. Modern user activity monitoring software is […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

When it comes to data protection and digital privacy, 2018 was a veritable disaster. From the continually expanding list of companies reeling from devastating data breaches to Facebook’s iterative apology tour, it’s been a troubling year. Unfortunately, the data landscape isn’t likely to improve anytime soon. Even so, the new year represents an opportunity to […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

How inadequate compliance methods compromised one of the world’s biggest banks and what to do about it By Isaac Kohen, Published in Wall Street Lawyer It’s been nearly a decade since Najib Razak, the former prime minister of Malaysia, launched the 1MDB state investment fund intended to facilitate growth for Malaysia’s middle class. However, an […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

GDPR – The Change Agent GDPR has changed how companies handle data loss prevention, in four critical ways. First, in addition to protecting core IP, financial and other sensitive data, companies now have to guarantee protection of the data of its customers and employees too. Second, the protection has to be from both outside intrusion […]
Read Full Article
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

“For programmers, the ultimate office perk is avoiding the office entirely.” — 2017 Quartz Poll While remote work in all sectors has increased, the number of distributed development teams is growing at an incredible rate, outpacing other industries by a wide margin. In fact, in a survey investigating the needs and desires of computer programmers, remote work ranked as the […]
Read Full Article

Read for later

Articles marked as Favorite are saved for later viewing.
close
  • Show original
  • .
  • Share
  • .
  • Favorite
  • .
  • Email
  • .
  • Add Tags 

Separate tags by commas
To access this feature, please upgrade your account.
Start your free month
Free Preview