BYOD Feared to Increase Insider Fraud Risk
Recently, Attachemate Corporation and the Ponemon Istitute released the second annual “Risk of Insider Fraud” report indicating that it takes 87 days to first recognize an instance of insider fraud and...
View Article46% of Organizations Report Stolen Devices
The 2012 Cost of Cyber Crime Study was recently released by Ponemon and HP Enterprise Security highlighting that the cost and frequency of cyber crime have continued to rise for the third year in a...
View ArticleCost of Data Breach Up in 2013 Report
The Ponemon Institute and Symantec recently released the 2013 Global Cost of a Data Breach study indicating that the cost of a data breach went up from $130 per lost record to $136 per lost record. The...
View ArticleAbsolute Software 2012 Endpoint Security Report
Absolute Software today released the findings of the 2012 Endpoint Security Report revealing that there has been a significant increase in proactive data protection. Following the 2011 Computer Theft...
View ArticleDevice Theft: Top Cities for Theft; Where They End Up
Absolute Software’s recently released 2012 Endpoint Security Report details device theft insights from the 12,705 investigations we completed in 2012. At the close of 2012, we had recovered more than...
View ArticleCybercrime Up and More Complicated to Resolve
According to the 2013 Cost of Cyber Crime Study conducted by the Ponemon Institute on behalf of HP, the cost, frequency and time to resolve cyber attacks is all on the rise for the 4th year in a row....
View ArticleHIPAA Regulations Get Teeth, Report Offers Insight
The U.S. Department of Health and Human Services (HHS) Office for Civil Rights released the HIPAA omnibus final rule last month, implementing a number of provisions of the Health Information Technology...
View ArticleEmployees Putting Data at Risk: Endpoint Security Can Help
Research released earlier this year from SONY VAIO in their Digital Business Report 2013 shows that employees are acting carelessly with corporate data and corporate devices, putting business “at risk...
View ArticleAbsolute Software Recognized in Gartner Critical Capabilities for Client...
Absolute Software today announced that Gartner has rated its client management solution, Absolute Manage, in its June 13, 2014 Critical Capabilities for Client Management Tools Report. Gartner gave...
View ArticleAbsolute Software and Samsung Provide Ideal Solution to Secure and Manage IT...
A little over a year ago, we announced the strategic global partnership between Absolute Software and Samsung Electronics. This partnership has led to the inclusion of patented Absolute persistence...
View ArticleHow to Protect Business Data from Dangerous Apps
Is your data under threat? I just wrote an article for TechRadar Pro about How to Protect Your Business From Dangerous Apps, talking about how employees could be inadvertently putting sensitive...
View ArticleHow to Prepare for a Mobile-Friendly Office by 2018
Despite bold moves by companies such as Yahoo to recall remote workers, the general trend is still transitioning toward an increase in remote workers. Currently, roughly 2.6% of the US employee...
View ArticleGoing Beyond MDM to Address Mobile Threats
Gigaom Research recently released a report entitled “Beyond MDM: what today’s enterprise needs to answer mobile security threats.” The report, written by analyst Michael Finneran, looks at how the...
View ArticleHealthcare Compliance Forces IT Security Expertise
I was recently interviewed by HealthITSecurity.com on the topic of Healthcare cybersecurity and compliance and the idea that there are many data breaches that are avoidable. The last few years have...
View ArticleAssess Your Enterprise Mobility Programs
Mobility has changed organizations, boosting employee satisfaction and productivity and enabling an unprecedented level of collaboration and communication. With these benefits, enterprises have faced...
View Article5 Crucial Ways to Protect Corporate Data
Security threats come in more shapes and sizes than ever before. Keeping tabs on all the ways your corporate data could be compromised can feel overwhelming, so I put together a list of the Five Top...
View ArticleTarget Discloses Final Data Breach Costs: The Takeaway for Organizations
Target was the victim of one of the most highly criticized data breaches in 2013; hackers accessed more than 40 million credit card numbers and 70 million addresses, phone numbers and other personal...
View ArticleHow the IoT Affects Healthcare
I recently wrote a post for MedCity News about how the Internet of Things is poised to affect the healthcare industry. In “What security worries HIT managers should have about the Internet of...
View ArticleA Framework to Assess BYOD
Aragon Research recently put out a Special Report looking at how to maximize the benefits of BYOD. The report, Confronting BYOD, builds upon the concept of of “bring your own workplace,” which urges...
View ArticleHow to Manage the IoT in Healthcare
I recently wrote a two-part series for MedCity News about how the Internet of Things affects the healthcare industry. In my first post, “What security worries HIT managers should have about the...
View Article
More Pages to Explore .....