In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...
USB review, Part 1: How are USB flash drives a security risk?
We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied...
Is your sensitive data overexposed?
76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...
Bring down data storage costs by getting rid of obsolete data [Savings estimator]
Redundant, obsolete, and trivial (ROT) data refers to information housed in data repositories that is either not in use or not needed in current business operations. These are...
Why companies need URL filtering for enhanced cloud protection
The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with the accelerated adoption of cloud applications in the workplace—has created an urgent...
Healthcare cybersecurity: Our 6-step plan to secure healthcare data
The HIPAA Journal reported that “2020 was the worst ever year for healthcare industry data breaches.” In the US alone, there were 642 reported data...
CISO’s guide to building an ironclad data loss prevention strategy [E-book]
“The Global Datasphere will grow from 45 Zettabytes (ZB) in 2019 to 175ZB by 2025.” – International Data Corporation (IDC) As data proliferates, traditional data...
Alert AA20-302A: Federal agencies warn about ransomware attacks targeting hospitals
“We have credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers.” – FBI, CISA, and HHS A cybersecurity bulletin...