Thirty-two percent of healthcare organizations store a wide range of sensitive data in the cloud, including healthcare data and personally identifiable information (PII) of customers and employees.
What is an insider threat? Security professionals know that insider threats, by their nature, are a broad-based threat and, more than ever before, can be extremely difficult to defend against. In this article, we will briefly discuss the possible risks, as well as some options for building up your defenses.
In Australia, data loss/theft of confidential information incidents rose by 78.7 percent in 2018 compared to 2017 and data breaches experienced through third party providers and suppliers rose by 74.3 percent, according to the BDO and AusCERT 2018/19 Cyber Security Survey.
The Verizon Mobile Security Index finds half of respondents sacrificed security to “get the job done”.
March 5, 2019
Verizon’s second Mobile Security Index finds that more organizations are compromising mobile security in order to “get the job done”, and in turn are facing a greater risk of data loss, downtime and damage to their reputation and customer relationships.
A team of cybersecurity researchers at Ben-Gurion University of the Negev (BGU) has demonstrated that valuable user information can be exfiltrated by tracking smartphone touch movements to impersonate a user on compromised, third party touchscreens while sending emails, conducting financial transactions or even playing games.
With one-third of working adults in the U.S. admitting to potentially risky behavior at work, employee negligence poses major security concerns for U.S. businesses.
Cybersecurity gets much attention, yet physical security and investigations are still a key element in enterprise security, particularly with insider threats