You are here
Home > Articles (Page 16)

Which sectors suffer the most identity breaches?

According to a study conducted by Symantec, healthcare is the most prone sector to data breaches followed by education and government sectors. Together these three account for 65 per cent of the identities breached in 2012. Though most of the data breaches were the result of attacks by outsiders, instances such

10 signs that you might have a data governance problem

Lack of proper data management exposes an organization to significant risk. While discussing and reviewing issues in technology systems and failed projects, we usually create a data path to the problem. Data governance issues can exist in organizations of any size, but if you don’t know much about data governance, that’s

What it Takes to be a Big Data Analyst

Big Data is in. There is a huge demand not only for Big Data Scientists but for Big Data Analysts as well. While a big data scientist needs various capabilities and skills to analyze and mash up various data sources, a big data analyst needs to performs data analysis on a

10 Tips to Prevent Data Theft

Articles

Although it’s the large companies that make headlines, small businesses are a major target for data theft, too. Learn how to protect your business from this growing risk. More>>

Beyond the hype of big data: 5 tips to strategic data management

The volume of data has exploded exponentially, but what we must realize is that organisations have been working with extremely large data sets for decades. Smart use of data can help marketers create a richer, more interactive customer experience at every touch point  from correspondence to call-center interactions. It provides an opportunity to

Choosing Security Products: DLP Technology

Data leakage can be simply defined as the accidental or intentional exposure of sensitive information. To counter this ever-present threat, data loss prevention (DLP) products have become a critical technology to many enterprises. Even though many purchases are driven by regulatory compliance or the desire to avoid negative ramifications associated

How businesses can safeguard the security of their data

Employees accessing multi devices—such as laptops, tablets, mobile phones—are making it difficult to safeguard their confidential information. The staff at the BBC had £750,000 worth of gadgets lost or stolen since 2010. This highlights the growing `data security’ issue many companies are facing. While the cost of replacing these expensive

Top