Quantcast
Channel: ITProPortal » data breach
Browsing all 112 articles
Browse latest View live

Healthcare data breaches hit 111 million Americans last year

In the last year there have been a number of data breaches involving the healthcare industry. These included high profile attacks such as those on Premera Blue Cross and Anthem compromising millions of...

View Article


Endpoint vs Network Security – Who wins?

If you can contain or block threats before they hit the endpoint with network-based security such as detection and sandboxing,that is always a good idea. The problem is that if you don’t secure the...

View Article


IT trends in 2016: The evolution of enterprise mobility management

Mobility is always a hot topic; while it promises significant productivity benefits, it also brings security and management challenges to businesses. IT departments face a balancing act between...

View Article

Cyber attack costs TalkTalk 100,000 customers

The cyber attack suffered by communications provider TalkTalk last year was one of the most high-profile breaches of the year and the company has now revealed that it has cost them 101,000 customers....

View Article

Humans at fault for data breaches in ‘unsurprising’, experts say

GovNewsDirect recently released new findings which show that humans are to blame for more than half of all data breaches in the UK’s public sector. The biggest issue seems to be with data ownership:...

View Article


Data breach costs UK firms £1.2 million on average

UK companies no longer believe data breaches are something that usually happens to someone else – they’re now expecting it, and expecting it to cost. According to the latest Risk:Value report from NTT...

View Article

IT pros confident they can detect a cyber-breach

A new study by security firm Tripwire says IT security experts are very confident they can detect a breach, and that they can detect it quite fast. For automated tools, they weren’t that confident. The...

View Article

How to get to know your IT assets better this Valentine’s Day

Have a romantic dinner for two planned? Box of chocolates and flowers ready? Maybe a jumbo-sized stuffed bear holding a heart? If you don’t have anything set up with your significant other for...

View Article


It’s time the c-suite took data privacy seriously

Data privacy and security has been one of the biggest issues in business and technology over the past decade or so. Since the 2006 Nationwide Building Society incident, when a stolen unencrypted laptop...

View Article


How to mitigate your cloud computing risks

Cloud computing technology is fast becoming a solution for problems that have plagued organisations and taxed IT departments for years. Maintaining and managing IT in-house is a heavy burden for both...

View Article

Consumers will avoid service providers that suffered a breach

Kaspersky Lab has recently done a survey to see how much data security practices of banks and online retailers affect consumers’ choices and, as it turns out, they do – significantly. The survey asked...

View Article

Skills, strategy and security: The recipe to tackle cybercrime in 2016

Businesses are and increasingly will be, in the firing line of big cyber threats. Kaspersky Lab has announced the end of the Advanced Persistent Threat (APT) as we know it in 2016. Specifically, we...

View Article

Malicious insiders are not the number one security threat

There have been 1,673 data breaches last year. They have led to 707 million data records being compromised. Those are the results of a new report by digital security firm Gemalto, entitled Breach Level...

View Article


Cloud and vulnerability management: Avoiding the security stumbling blocks

Security is a big challenge for many businesses. The growth in data breach stories in 2015 proves that companies of all sizes can be successfully attacked. From small organisations like Ashley Madison...

View Article

Defending your business against cybercrime

The UK crime rate recently doubled after the ONS included cybercrime in its calculations for the first time, showing that cybercrime is a real and present danger. Businesses everywhere are rightly...

View Article


Privacy Shield: How businesses should navigate the new cyber security regulation

What’s in a name? When it comes to cyber security and public policy specifically, the answer appears to be: quite a lot. It announces opinion and cements commitment. The most recent example is of...

View Article

7 steps to a successful cyber attack

While it is true that pretty much every network is vulnerable to a cyber attack, it is also the case that attackers must follow a certain formula of actions to compromise these systems. Industry...

View Article


What are the hot topics on the conference floor this year at RSA?

RSA Conference 2016 is currently taking place in San Francisco, with events planned in Singapore and Abu Dhabi later in the year. Here, we take a look at some of the hot topics being discussed on the...

View Article

Security in the healthcare sector stuck in the Dark Ages

“The healthcare sector is a good 10 to 15 years behind the retail sector when it comes to security.” This is the disturbing revelation from medical device security advocate, Scott Erven as reported by...

View Article

Bromium survey: Endpoints are the worst and security pros are sick of stupid...

Bromium, the micro-virtualisation specialists from California, has just released the results of a survey conducted at RSA 2016 with some surprising results. Users take note! Asking 100 security...

View Article
Browsing all 112 articles
Browse latest View live