
Anurag Kahol
CTOfeature_status*/ ?>
Bitglass
Comments Dotted :
15
November 24, 2020
All companies should understand that it is essential to have full visibility and control over their customer data in order to prevent a breach.
A staggering 53% of consumers admit to reusing the same password across multiple sites, even knowing the risks associated. This poor password hygiene allows cybercriminals the opportunity and access to various accounts for the same individual across multiple services, rendering their digital footprint incredibly vulnerable as a result. All consumers, not just users impacted by this incident, need to make a habit of diversifying their login credentials across different accounts in order to.....Read More

November 13, 2020
Incidents like this emphasise the criticality of ensuring that proper cloud security controls are implemented to defend users’ data.
The personally identifiable information (PII) and financial information connected to users’ gaming accounts are valuable data that attackers can use to commit financial fraud, identity theft, and trade on dark web marketplaces. Incidents like this emphasise the criticality of ensuring that proper cloud security controls are implemented to defend users’ data.
To mitigate the risks of future data breaches and protect sensitive data, all organisations must have full visibility throughout.....Read More

November 10, 2020
detect misconfigurations through cloud security posture management, encrypt sensitive data at rest
Every year, hotel and booking platforms collect sensitive consumer data and store the personally identifiable information of millions of guests. To mitigate the risks of future data breaches and protect sensitive data, hospitality organisations and other companies need to have full visibility and control over their data.
By leveraging multifaceted solutions that enforce real-time access control, detect misconfigurations through cloud security posture management, encrypt sensitive data at.....Read More

October 27, 2020
By understanding modern threats and deploying appropriate security solutions, many of these risks can be mitigated and even eliminated.
A recent Bitglass study found that 73% of organisations believed insider attacks had become more frequent over the past year. Cloud adoption and bring your own device (BYOD) policies have improved businesses’ agility, but have also made sensitive data more accessible, presenting a significant IT security challenge.
Unfortunately, in cloud-based IT environments, organisations often struggle to detect anomalous or careless employee behaviours. As such, many must revise their approaches to.....Read More

October 09, 2020
A staggering 59% of consumers reuse passwords across multiple accounts.
Payment card-skimming malware continues to be a security challenge for retailers around the globe. Unfortunately, when armed with payment card information or personally identifiable information (PII), malicious parties can make fraudulent purchases, sell said data on the dark web for a quick profit, and much more.
A staggering 59% of consumers reuse passwords across multiple accounts. This means that if a cybercriminal appropriates a single password, they can potentially gain access to a.....Read More

October 06, 2020
These controls enable businesses to verify users’ identities and enforce measures.
While phishing attacks are not a groundbreaking threat and there is an elevated level of awareness around these schemes, hackers can still find success with this tactic by taking advantage of major news. During this stressful time, recipients of these messages are more likely to click on malicious URLs, open attachments, and give up personal data. Most organisations have responded by educating employees about how they can best identify phishing attacks as well as telling them what they should.....Read More

September 10, 2020
Strategic investments in cybersecurity will make a significant impact on protecting healthcare businesses against cybersecurity risks.
Healthcare organisations are major targets and will see any and all lapses in security exploited by malicious individuals, both internal and external. Companies handling medical records are heavily targeted by cybercriminals, therefore, they take every precaution necessary to protect patient data. Hundreds of hospitals, medical offices, and imaging centers have contributed to over a billion exposed records.
According to Bitglass' Healthcare Breach Report, the number of records breached in.....Read More

September 07, 2020
Governments must ensure adequate employee training to protect from ransomware.
To prevent future ransomware attacks and safeguard highly sensitive information, federal agencies must have full visibility and control over their data. This can be accomplished by leveraging multi-faceted solutions that defend against malware on any endpoint, enforce real-time access control, detect misconfigurations, encrypt sensitive data at rest, manage the sharing of data with external parties, and prevent data leakage. In addition, governments must ensure adequate employee training to.....Read More

August 18, 2020
This includes solutions that can automatically block malware in the cloud that is both at rest or in transit.
The travel industry is an extremely attractive target to cybercriminals, as they can collect and store personally identifiable information (PII) on billions of passengers every year, including passport numbers, credit card information, email addresses and much more. Whilst it’s unclear at this time how the hackers infiltrated Carnival’s systems, they have said the attackers "accessed and encrypted a portion of one brand's information technology systems," and that the intruders also.....Read More

July 15, 2020
The reputational and financial repercussions of breaches can impact a company for years.
Outsourcing services provides significant advantages for growing businesses, but relying upon third-party partnerships can expand the attack surface for bad actors looking to gain access to company and customer data. While the incident involving DataViper was clearly motivated by revenge, bad actors frequently target third-party vendors in order to gain access to enterprise data that may otherwise be well protected. The reputational and financial repercussions of breaches can impact a company.....Read More
