Though there are many reasons for companies to collect personal data, it’s personal data that creates opportunities for businesses to get to know their customers better, to develop new revenue streams, and to provide a more customized level of service. In recent months, online privacy has been a subject of great
Articles
Data Protection: Information Lifecycle Management
Do your employees choose data protection or productivity?
While every CSO would hope the employee would choose to protect the confidential information, the reality is that many would not. So how does a CSO identify the weak links in the organization and prevent cybercriminals from gaining enterprise data through spear phishing and other low-tech methods like snooping? More>>
Make All Employees Part of Your Data Security Team
Though hackers get the attention whenever a data breach happens, your own employees can also be the biggest threat because they open the door and turn the lights on for the hackers. Safeguarding sensitive information is not the job of the IT department alone; it should be everyone’s job to protect
PCI Compliance: What You Need to Know
7 habits of highly successful cloud-based medium businesses
Password can stop a mobile hack attack
Putting a password on your smartphone is a simple step to reduce personal information or identity being stolen by cyber criminals. According to Symantec's latest cyber-crime report, there was a 42 per cent increase in targeted cyber attacks in 2012, with manufacturing and finance, insurance and real estate being the top
Database security and compliance a top priority for CIOs
CIOs need to know where their crucial data is; what is happening to the data; who is accessing the data; whether the data is private and secure; and whether the above can be reported on. More>>
Potential, Pitfalls of ‘Big Data’ for Humanitarians
Humanitarians and crisis-affected communities are increasingly exploiting new technologies to gather near real-time information to prepare for, prevent and handle disasters, even as analysts caution against overreliance on "big data". More>>