Tag "Identity Theft"

Back to homepage
Identity Theft

The Top Security Breaches in History

By Telemessage, Technology has indeed enabled companies of all sizes and nature to rethink and innovate the way they do business. Through the power of the internet, digital platforms, and

Identity Theft

OPM Still Failing on Security After 2015 Breach

The US Office of Personnel Management (OPM) has still not implemented over a third of the recommendations made by government auditors after a devastating 2015 breach. Some 29 recommendations remain “open” out

Identity Theft

2018 On Track to Be One of the Worst Ever for Data Breaches

A total of 3,676 breaches involving over 3.6 billion records were reported in the first nine months of this year alone. It has been another brutal year for organizations, according

Identity Theft

Wider breach awareness fosters more security conversations

Focal Point Data Risk released the second annual Cyber Balance Sheet Report, a closely watched research study using in-depth surveys and interviews of corporate board members and CISOs to offer a rare

Identity Theft

Don’t Go Once More Unto the Breach: Fix Those Policy Configuration Mistakes

As security threats become more and more advanced, managing your network’s defenses correctly has never been more critical. The effectiveness of firewalls and other security devices depends on the security

IT Compliance

Most consumers worry about cybercrime, but are not aware of what can be done about it

There is a high level of concern among consumers about the risks associated with cybercrime from their smart devices, and one in four claims to be a victim of a

Identity Theft

Compliance is Largest Driver of Data Management Initiatives for Half of Businesses

According to The Future of Enterprise Data: Democratized and Optimized report by ASG Technologies, the trusted provider of proven solutions for information access, management and governance for the world’s top

Identity Theft

What is IAM? Identity and access management explained

Identity and access management (IAM) in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted

Identity Theft

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best IT security directors will confess that

Identity Theft

Risky Business: The Hidden Costs & Impact of Business Data Breaches

With the volume and velocity of data breaches increasing year-over-year, it’s safe to say no business is safe. Now is the time to be prepared for the myriad of threats