Given modern-day costs and reputational damage that result from a data breach, it is important for organizations to protect against insider threats.
Browsing: Data protection
Disaster recovery (DR) technologies should be considered an integral component of multilayered protection for both your data and your uptime.
According to a new study by Iron Mountain, 46 per cent of IT teams will insist on keeping data close at hand on hardware they can see, touch and control.
Businesses across Europe would be advised to realize the risks to their sensitive information and enact changes to meet the new EU data protection reforms.
Experts in the information security field comment on the Supervalu data breach.
Google has announced that it will lower the search ranking of websites that don’t use encryption in order to promote better online security practices.
Despite the need to focus on information security, a full-time information security manager might not be the best use of your organization’s resources.
According to a new report from Intermedia, employees often leave their jobs with their corporate IT access intact.
BYOD requires a security policy which is enforceable, realistic, acceptable to users and doesn’t violate personal privacy laws.
Brian McHenry discusses the pitfalls and effectiveness of encryption methods used for internet traffic.