Tag: Data Breach

Sensitive Information: The What, Why and How of Securing Sensitive Data
Many people think they understand the intricacies of securing sensitive data until they’re asked to elaborate beyond the mere definitions. This post delves into the what, why and how of this topic in great detail, effectively separating chaff from grain and bringing clarity where many blogs have failed.
6 Steps for Creating a Manufacturing Cybersecurity Program
The rapid digitization of manufacturing, especially with the interconnectivity of IoT, has resulted in novel and unprecedented cybersecurity risks.
How a Pandemic Started a Trend Called Zoombombing
Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.
How Hacking, Trolling, and Misinformation Impacts Cybersecurity
The Dark Triad brings together three types of online cyber attacks: hacking, misinformation, and trolling. While they can each work independently, they usually feed off each other and become especially potent when working in concert.
Podcast: Managing eWaste in a Secure and Compliant Manner
Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices.

Also Able to Explore

Prefooter Dots
Subscribe Icon

Latest Stories in Your Inbox

Subscribe to get all the news, info and tutorials you need to build better business apps and sites

Loading animation