Tag "Data Breach"

Back to homepage
Identity Theft

10 Tips for Protecting Your Company’s Data Against Insider Threats in 2019

Perhaps because of their incredible scope or their shocking prevalence, data breaches are creating a lot of buzz right now. It seems that a new event happens every week, and

Identity Theft

A New Year’s Resolution: Security is Broken…Let’s Fix It

As we near the end of 2018, another wave of massive cyber-attacks has exposed personally identifiable information belonging to hundreds of millions of people and will cost the impacted businesses

Industry Insights

Cybersecurity Tools That Every Business Should Consider in 2019

Businesses ignoring cyber security has become a thing of the past. With the sudden increase in cyber-attacks and data breaches, cybersecurity remains at the front of many business leaders’ minds.

Identity Theft

Why Data Breaches are all About Trust

Let’s start this article off with a tally. How many times today have you had to put trust in someone or something? From trusting that the toothpaste you bought from

Software

AI in cyber security: a help or a hindrance?

AI has the possibility of being deployed by both sides: those looking to attack and those looking to defend.With a disappearing IT perimeter, a widening skills gap and the increasing sophistication

Identity Theft IT Compliance

C-Suite: GDPR Could Lead to Greater Risk of Breaches

Almost a quarter of UK and German businesses (23%) believe the GDPR may have resulted in a greater risk of data breaches, six months after the legislation was introduced.  The

Industry Insights

Is There Too Much Pressure On CISOs?

Are CISOs really being taken more seriously now? How much do they have to ‘thank’ mainstream media attention of cyber security and data breaches? It seems that every week I

Network Security

Let’s Not Run Before We Can Walk: Security As The First Step For Digitised Healthcare

The acceleration of electronic personal health information (ePHI), coupled with an increase in healthcare technology – from cloud-based applications to IoT-enabled devices to telemedicine – has paved the way for

Identity Theft

Third Parties: Fast-Growing Risk To An Organization’s Sensitive Data

The Ponemon Institute surveyed more than 1,000 CISOs and other security and risk professionals across the US and UK to understand the challenges companies face in protecting sensitive and confidential

Identity Theft

The Top Security Breaches in History

By Telemessage, Technology has indeed enabled companies of all sizes and nature to rethink and innovate the way they do business. Through the power of the internet, digital platforms, and