Has your company taken the necessary measures to ensure that you and your customers are protected from malware and data breaches? Do you have a solid data breach incident management and data recovery plan? Recent evidence suggests that businesses are not adeq…
Organisations have to share sensitive files either between departments or with an outside organisation on a routine basis. The risk lies then, that your confidential files could be transferred beyond the security of the enterprise content management system or…
Downloading malware, Trojans, and other pieces of malicious or damaging software is a serious concern amongst business owners in the Asia Pacific region. A study released in 2015 showed that trojans were found to be particularly prevalent in the Malaysian, Si…
According to Gartner, a laptop is stolen every 53 seconds. An Intel and Ponemon Institute study in 2010 accounted 46% of such lost systems contain confidential data. The same study stated that only 30% of company systems containing confidential data are encry…
Did you know that it’s been 16 years since the first commercial USB drive was launched? While there are cloud solutions today, the USB drive still remains a great compact tool for storing and transferring large amounts of data, especially as an offline soluti…
According to Reuters, a French naval contractor DCNS said on Wednesday it may have been the victim of “economic warfare” after secrets about its Scorpene submarines being built in India were leaked. If this was economic warfare as speculated, we can expect mo…
In recent news about the Personal Data Protection Commission taking action against 11 firms for data privacy breaches in Singapore, the security of digital data such as intellectual property are but a growing concern for many businesses regardless of industry…
Did you know that in 2015 alone, cyber criminals stole about 300 million records and over $1 billion across 100 banks in 30 countries? Even Fortune 500 companies, with the best perimeter defenses and purpose-built network surveillance systems, have not been i…
Healthcare organizations are prime targets for hackers and ensuring adequate protection of sensitive information across data types, users and systems is paramount. The reported breach – http://zd.net/2asduE0 – illustrates how healthcare system file collaborat…