A lot of our information is now being stored in the cloud instead of hard drives and databases. Cloud transition helps to provide greater scalability and cost saving, hence the demand for cloud services are growing tremendously.
As a result, there are many cloud services all dealing with finding ways to make it easier for their customers to access and store data over the internet instead of on their computer’s hard drive. While cloud services may sound like a much better alternative to hard drives, the main issue with these services is the lack of security and protection. Continue reading Cloud Services Are Vulnerable Without End-to-End Encryption
Equifax is one of the largest credit bureaus in the United States. Using personal data, they collect on almost anyone, Equifax creates a credit scores for anyone they track which is requested by lenders when you apply for a loan or a credit card. On July 2017, cyber criminals stole sensitive data of 145 million Equifax consumers. It was considered among the worst breaches of all time because of the amount of sensitive information exposed, including Social Security numbers. Continue reading Equifax Sent Erroneous Letters to Breach Victims
2017 was the year of data breaches, from Ransomware to WannaCry attacks, to the mother of all data breach, Equifax attack. It seemed like there’s a new breach in the headlines every week. There was an undisputed rise in data breaches in 2017. Continue reading Essential Tips for Preventing Data Breaches
PayPal Holdings, Inc. is an American company operating a worldwide online payments system that supports online money transfers. In July 2017, PayPal paid around $238 million to acquire TIO, with the goal of reaching more consumers who don’t have traditional financial accounts. Continue reading PayPal’s TIO Networks reveals data breach impacted 1.6 million, users
The third massive ransomware attack Bad Rabbit is on the rise. It has infected several major Russian media outlets, Odessa International airport in Ukraine, and numerous computers in Europe. And now, it’s spreading throughout the United States.
Privately owned Russian news agency Interfax was hit particularly hard, to the extent that 24 hours later its website still displayed a message reading “Our service is temporarily unavailable.” Continue reading “Bad Rabbit” Ransomware Strikes Russia and Ukraine
With the rapid technological advancements, companies from large enterprise businesses to small businesses have a presence online. Thus, they are required to keep sensitive data secure from theft and vulnerability in today’s digital world. This is not an easy feat, especially with the extensive adoption of cloud computing technologies. And even if you take the necessary precaution and protection of your online accounts and sensitive data, there are still many ways that information can land in another data management system, where it can be vulnerable. Continue reading Mistakes companies make when securing sensitive data
Big Data – An explosion of digitized data created by people, machines, sensors, etc. is the most talked about technology for many business organizations today especially with devices that are Internet of Things (IoT). A growing number of companies are now reaping the benefits of big data analytics technology to manage their data better, benefit from the speed, capacity and scalability of cloud storage and finding new business opportunities. Continue reading Big Data Cloud Companies Must Rethink Data Security
The worldwide cloud computing market is expected to grow to $191 billion by 2020, according to analyst firm Forrester, up from $91 billion in 2015.
In the last few years, there has been an ignition of new apps that help people be more productive and conduct business anywhere. Employees are bringing various apps to work with them to do their jobs more efficiently. While companies recognize the benefits of the “bring your own cloud” (BYOC) movement for their organizations, you may have heard of it referred to by the more ominous title of “shadow IT.” In most cases, shadow IT starts with good intentions – employees will use apps that can help them be better at their jobs, but often, they will not be aware of the risks that are associated with storing corporate data in unsecured apps. Sky-high analyzed cloud usage of 18 million employees and found the average company uses 923 cloud services. Continue reading Cloud Computing Security Threats
Recently, there were two separate data breaches reported, one on DocuSign, a major provider of electronic signature service, and another on Bell Canada, Canada’s largest telecommunications company, TV, and internet service provider. Bell Canada has confirmed that the company had a breach by an unknown hacker who has managed to access its customer information illegally. Continue reading Bell Canada hacked. 1.9 million customer account details stolen
Encryption of data-in-transit and data-at-rest is a best practice to enforce the security and privacy of data, regardless of where it resides.
Data in Transit must be protected to maintain its confidentiality and integrity including the integrity of the sender, receiver, and company. Many organizations and businesses perceive tremendous competencies in offering data to their employees (even sensitive data) anywhere, anytime. Therefore, it is critical to making sure that any data in transit is protected from beginning to end. Continue reading Encrypt Every Data at Rest and in Transit