You are here
Home > Posts tagged "data security" (Page 3)

5 Truths Your IT Asset Manager Should Know About Data Erasure

IT asset disposition is an area that can make a company’s data security vulnerable. At a time when a single data breach could cost millions, you can’t afford the risk of allowing any IT equipment to leave its control with sensitive data still stored on it. There are many misconceptions

Employee carelessness among top causes of data theft

According to the findings of the Global Corporate IT Security Risks 2013 survey conducted by B2B International and Kaspersky Lab, employee error is one of the main causes of internal IT security incidents leading to leakage of confidential corporate data. More>>

How the word ‘hacker’ got corrupted

What is generally called "hacking" today was originally called "cracking" in technical circles - as in cracking a safe. Hacking, in its original meaning, has nothing to do with malicious behavior. The term "hacker" seems to have originally developed decades ago at the Massachusetts Institute of Technology in the United States,

2013 Data Breach Investigations Report (DBIR)

This year’s DBIR combines the expertise of 19 organizations from around the globe. Download the report to discover stats that might surprise you—from the percentage of espionage-related attacks to the astonishing length of time it often takes to spot a security breach. By knowing today’s threats, you can better protect

Yahoo! says it had 13,000 data requests

Yahoo! said that it had received up to 13,000 requests for information from US law enforcement agencies in the last six months. Yahoo! is one of the popular tech giants that came under heightened scrutiny since government contractor Edward Snowden leaked details of PRISM, a vast program that saw nine

The Most Overlooked Part of Your Data Security

In their rush to replace outdated hardware and IT infrastructure, organizations fail to manage and dispose these properly.  During a recent IT asset disposal project for a large New York bank, a chain-of-custody audit revealed three computers were untracked. An IT director was suspected of taking them. More>>

Make All Employees Part of Your Data Security Team

Though hackers get the attention whenever a data breach happens, your own employees can also be the biggest threat because they open the door and turn the lights on for the hackers. Safeguarding sensitive information is not the job of the IT department alone; it should be everyone’s job to protect

Top