Identity Theft

Back to homepage

Compliance is Largest Driver of Data Management Initiatives for Half of Businesses

According to The Future of Enterprise Data: Democratized and Optimized report by ASG Technologies, the trusted provider of proven solutions for information access, management and governance for the world’s top

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best IT security directors will confess that

Risky Business: The Hidden Costs & Impact of Business Data Breaches

With the volume and velocity of data breaches increasing year-over-year, it’s safe to say no business is safe. Now is the time to be prepared for the myriad of threats

You should prepare for the next mega data breach

As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data,

Do You TRUST an Organization After it Suffers a Breach?

In the last couple of years, there has been a continual stream of concerning data security breaches. In fact, the Ponemon Institute Data Breach report recently published in July 2018 highlighted that

Don’t Let Privileged Accounts Be a Privilege to Outsiders

Privileged accounts are essential to businesses both big and small, but these accounts pose a greater security threat than meets the eye. Sometimes, clicking on a malicious link is all

Protecting your digital identity from hacks and breaches

As our identities become increasingly digital, protecting them from cyber threats has never been more important.With hacks and data breaches making the news on an almost daily basis, the words

Phished credentials caused twice as many breaches than malware in the past year

Personal device use for remote work poses the biggest security risk to organisations safeguarding their increasingly mobile and cloud-based IT environment, according to a new survey of 100 UK-based senior

Identities Are The New Security Perimeter

There’s been a 135% year-over-year increase in financial data for sale on the Dark Web between the first half of 2017 and the first half of 2018. The Dark Web is now