A new study finds that one in four consumers admit to using their work email or password to log in to consumer websites and applications such as food delivery apps, online shopping sites and even dating apps.
Original research from CybelAngel takes a look at how cybercriminals plan healthcare-related fraud, ransomware and other attacks by obtaining stolen credentials, leaked database files and other materials from specialized sources in the cybercrime underground.
Among the “The State of API Security – Q1 2021” findings, 66% of organizations admit to having slowed the rollout of a new application into production because of API security concerns. In addition, 54% of organizations running production APIs have at best only a basic strategy for API security, with 27% having no strategy at all.
New research reveals 66% of home workers in the U.K. are potentially breaching GDPR regulations by printing work related documents at home, including meeting notes, contracts, commercial documents, payroll documents, CVs and more. Many are aware of GDPR rules, however, say they have no choice but to print such documents while working remotely.
In a letter, U.S. Rep. Robert C. Scott, chairman of the House Committee on Education and Labor, urged the acting federal education secretary to open a federal investigation into Florida's Pasco County school district's practice of sharing student data with law enforcement.
Code42 pulled some anonymized, aggregated data from Incydr, a SaaS data risk detection and response solution, showing how users move and exfiltrate data and files. The most exposed type? Business documents.
On average, organizations experience 180 incidents involving sensitive data, or one every 12 working hours, according to Egress. The three top causes of outbound email data breaches include: the wrong recipient added, wrong file attached or replying to a phishing scam.
The Department of Homeland Security (DHS) issued a business advisory to American businesses warning of risks associated with the use of data services and equipment from firms linked to the People’s Republic of China (PRC).
Despite many companies' best efforts to combat cybercrime, it persists and is increasingly costly. Here’s a look at some of the latest technologies that may be able to turn the tide against malicious hackers because they can still deliver performance and function at the necessary scale.