Data breaches and cyber-attacks seem to have become the new normal in today’s increasingly digital world, but it’s not all gloom-and-doom – there are steps you can take to protect your organisation.
Restricting or cutting off access should not even be a consideration, while threat intelligence needs to grow up and become actionable, security experts tell Benjamin Cher.
Expect at least two major data breach incidents to occur every month in 2015 Corporate BYOD policies must be ‘living documents’ to accommodate rapid changes
The greatest threat to mobile security resides within the organisation, with 87% of professionals in a survey calling out careless employees. Nearly two-thirds of the respondents believed that recent high-profile breaches of customer data were likely due to employee carelessness, according to Check Point Software Technologies Ltd.
In a global survey of IT professionals, 27% of all businesses said they have lost sensitive business data due to internal IT threats in the past 12 months, according to Kaspersky Lab. For the first time since the company began tracking these incidents in 2011, accidental data sharing by staff now produces a greater amount of lost data than software vulnerabilities.
When it comes to security, don’t ignore people. Organisations should define, strategise, deliver and verify a comprehensive information security awareness programme for the workforce, writes Sivanathan Subramaniam of Cyber Intelligence.
A survey of more than 600 IT and line of business decision-makers or influencers in North America, the United Kingdom, Australia and New Zealand saw more than 80% admitting to using non-approved applications in their jobs, according to McAfee.
The first step for any organisation seeking to better address security concerns is to establish a policy framework, which will underpin the work their IT departments embark on, says IDC’s Mayur Sahni.
CyberArk has announced the availability of Master Policy, which it said was a ‘policy engine’ that would enable customers to set, manage and monitor privileged account security in a single, simple, native language interface.
The escalating number of security rules and policies accumulated by firms over time is leaving many unable to respond effectively to the changing threat landscape.