What Happens When your Bosses’ Emails Is Stolen?
The days of managing your own emails are numbered. Most organizations will inevitably turn to email cloud providers in the near future as the proposition of cost savings and reducing menial IT tasks …
The days of managing your own emails are numbered. Most organizations will inevitably turn to email cloud providers in the near future as the proposition of cost savings and reducing menial IT tasks …
The privacy of email messages are often overlooked by most organizations in their quest to shore up its cyber security posture. Priority is still given to perimeter, systems and infrastructure …
Keeping data safe from exposure despite having backups Unlike WannaCry and NotPetya, recent more sophiticated Ransomware like Maze, DoppelPaymer, Revil and Snatch are emerging types of ransomware that not only …
In part 2 of our Data Protection FAQ series, we look at common questions asked about key management. The hardest part of implementing strong encryption is securely and effectively managing …
The final part of our Data Protection FAQ series touches on commonly asked questions about database column and field encryption. As data breaches are becoming the new normal, encryption is …
Mobile devices contain or have access to the same information as traditional endpoints. While billions of dollars have been spent protecting and securing traditional endpoints, very little has been invested …
Critical systems are increasingly targeted because they contain the most valuable information. These systems cannot afford a moment of unscheduled downtime or performance degradation as they are the lifeblood of …
Are organizations getting value from their cyber security investment? In the recent research conducted by Gartner, it is reported that the estimated worldwide spending on information security products is expected …
AUG 5, 2019 812.67 million malware infections were reported in 2018. In that year alone, Microsoft’s monthly “Patch Tuesday” security patches addressed 682 vulnerabilities. With the frequency and volume of …