In the digital age, increasing amounts of data are being shared in new and often unanticipated ways. With the proliferation of data, devices and connections comes a set of new security threats. Midsize companies, in particular, are feeling the heat.
The Arab spring along with the Japan crisis, and most recently, the floods in Thailand, have brought the topic of tracking travelers to the forefront for many security professionals but, even more importantly, so have the challenges in doing so. Here are three main challenges that continue to exist with tracking travelers globally today.
The biggest threat to a company's intellectual property doesn't come from the outside; it comes from within. According to a recent study, the U.S. Chamber of Commerce estimates that 75% of employees steal from the workplace.
When it comes to preventing the loss and theft of mobile assets within the enterprise, there is no one-stop-shop security solution. However, the need has never been greater as mobile devices become more prevalent and hold more sensitive data.
As the number of solutions available in the cloud grows and an increasing number of organizations turn to SaaS-based solutions to improve operations while reducing their costs, an increasing amount of sensitive information is being communicated via the Internet. IT professionals are rightly concerned with uptime, privacy risks and overall security.
Every two seconds someone becomes a victim of identity theft in America and last year, identity theft totals amounted to $100 billion. Even though many organizations are expanding security efforts, the number of identity theft incidents is still increasing as thieves continue to change their tact on a daily basis.
Symantec Corp. announced its security and storage predictions for 2011 based on what its security and storage experts are observing in the information protection landscape
There was a time when people defined privacy as the right to be left alone, spurred by Supreme Court Justices way back when who saw the need to protect from the intrusion of instant cameras, of all things. Then there was a 2.0 definition that required a person to show harm of a so-called privacy violation in such areas as intrusion upon seclusion, appropriate of name or likeness, publicity given to private life, and publicity placing a person in a false light.