No cyber criminal (that we know of) has stolen more credit cards than Albert Gonzalez. Originally indicted by a federal grand jury for breaking into T.J. Maxx’s credit card processing operations, Albert Gonzalez and his team are accused of criminally hacking some of the best-known companies in America including; Dave
Tag: Data Protection
Data protection practices in EU and Asia
Research undertaken by Field Fisher Waterhouse examines the legal obligation to encrypt personal data in both Europe – with particular focus on the United Kingdom, France, Germany and Spain, and in Asia – focusing on Singapore, South Korea and Japan. The study details that the obligation to encrypt information often
Considerations for Using Tokenization to Mask Your Sensitive Data
When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high
Workers ignoring IT policies on data protection: study
How to Protect Your Data with Reliable BDR Storage Alternatives
Stages of a Successful Information Management Strategy
In the digital age, the amount of information that businesses generate and receive has grown exponentially. At the same time, the importance of this information has only increased. Information management, in previous years a relatively straightforward process, has become something potentially challenging. In the current business environment, all businesses, should consider
Australia and New Zealand’s Data Centres are Least Complex in the World: Symantec
According to a study conducted by Symantec, Australian companies run data centres that are less complex than their overseas counterparts. The study—which surveyed just under 2500 IT professionals in 36 countries—ranked Australia and New Zealand below the international average for data centre complexity. The US topped the list in terms
Exploring Different Test Data Management Strategies
Test Data Management (TDM) is about the provisioning of data for non-production environments, especially for test purposes but also for development, training, quality assurance, demonstrations or other activities. Test data has always been required to support application development and other environments but until the relatively recent advent of TDM this
BYOD: 10 Tips Enterprises Can Use to Protect Their Data
Bring your own device (BYOD) has become a huge trend as organizations look to reap the productivity benefits of a more engaged workforce while simultaneously making the company a more attractive place to work. According to a study conducted by Vertic, a digital ad agency, it is estimated that enterprise
5 Assumptions You Must Make to Address Data Security Breaches
Data security has become a top concern for IT departments, thanks with the rise in BYOD. More than ever, employees can access and store sensitive data on their personal mobile devices, making it vulnerable to becoming lost or stolen. “No matter the size of the company, from SMBs to large enterprises