Social engineering remains the top threat for enterprises


The latest Annual Trends Report from Jamf, based on a sample of 500,000 devices protected by the company's technology, looks at the threats impacting devices used in the modern workplace and finds social engineering tops the list.
The combination of an increasingly distributed workforce with the relative ease with which bad actors can carry out phishing campaigns, leads to the leakage of user credentials. In 2022, 31 percent of organizations had at least one user fall victim to a phishing attack.
How AI can evolve and up-level your firm's cyber defense strategy


A recent Statista report revealed the financial consequences of cybercrime in 2022 were higher than ever, with the average cost of data breaches in the U.S. totaling more than $9 million. With 2023 poised to be the year of reduced spending given an uncertain economy, protection against the rise of cyber incidents and data breaches will impact numerous industries and become more costly due to inflation. The human cost, however, is just as great, as businesses face increasing pressures to protect employees’ and customers’ personal information as well as their time and trust.
When a data breach occurs there’s little room and time for error: victims, as well as employees and stakeholders, expect a swift and appropriate incident response. Companies that handle mass amounts of personal data, especially in the legal sector where PII-containing case data is at stake, should look to new solutions rooted in artificial intelligence to complete similar tasks at faster speeds and reduced price points. This will also provide senior leadership much-needed peace of mind amid security-compromised induced stress.
The changing landscape of privacy and compliance


In the past decade, privacy-related legislation has developed considerably. The 'privacy industry' has gone through a metamorphosis not seen in many other disciplines. Now, as we reflect on the future post-pandemic, we must recognize that being able to quickly access and share accurate data is fundamental to everyone.
When thinking about this, it’s important to remember that there’s a heavy overlap between business and personal aspects, an example of this is password managers. These will have both personal and work-related credentials saved to them, which can be hard to distinguish, and this is why corporate family use plans exist.
Keep the faith with fax


It’s easy to assume that faxing has no place in today’s digitalized workplace. When email and Instant Messaging apps are so established and familiar, the idea of typing in a fax number, feeding a document into a machine, and then having to wait beside that machine to print out a response for you, sounds, at best, quaint: and at worse, slow, inefficient and unsecure.
But fax has evolved and continues to underpin vital operational processes across a range of sectors. The ongoing importance of timestamping plus the advent of cloud in particular means that whether it’s finance: exchanging the details for buying a house: or sending and receiving critical and confidential healthcare documents, fax still has a significant contribution to make in the day-to-day running of an organization.
More complexity, more automation and data sovereignty concerns -- cloud predictions for 2023


No longer the new 'big thing', the cloud has matured into something that almost all organizations rely on daily. But it's still evolving and its importance has grown over the last two years as we've switched to remote and hybrid working.
Here are some expert views on what lies ahead for the cloud in 2023.
The case for a security program


Modern corporations are fully dependent on their IT infrastructure for their daily operations. Securing an IT infrastructure can be a daunting task. Fortunately, there are common best practices that have found success for some of the biggest companies in the world. These best practices share common traits that can be duplicated to match almost any environment.
Before we begin, let’s examine the past failures of many security professionals. As security managers, we must understand that the most secure environments, regardless of the sophistication of your tools or the talent of your staff, will eventually be compromised by the weakest link in your controls. So how do we manage these weak links? Let’s start by identifying them.
Why Data Quality is critical for business


Since the explosion of technology in the last few decades, data has been increasingly positioned as a silver bullet that can fix all the trials and tribulations of the modern world. For those giant tech companies who amassed mass amounts of (mostly) third-party data, data was the new oil -- sold in barrels to any company wanting to find and scale an audience. But KPIs on data effectiveness became increasingly viable, businesses began to question the amount of data they’d bought.
Parallel to this, governments and consumer rights groups became aware of the increasing volume of unwanted noise being thrown at potential clients and customers. Businesses, both B2B and B2C, became liable for data missteps -- case in point with Meta being fined 17m euro for what amounted to bad data housekeeping.
How to pay off your technical debt -- and why you should


Financial management is crucial as personal and business expenditures grow. Understanding where efficiency can be boosted and where costs can be cut is vital for a positive business cash flow. Something which may be overlooked is your technical debt.
Here we explore how to know whether you are facing technical debt, how it might be harming your business, and how to get out of it.
How fake data can help to combat breaches [Q&A]


September this year marked five years since the notorious Equifax data breach which exposed the social security numbers, birthdates, credit card details, and more of millions of customers.
But how much has the industry learned from this breach? And what measures can be used to help avoid similar issues in the future? We spoke to Ian Coe, co-founder at Tonic.ai to find out why fake data might be the answer.
Your personal data has become an AI training manual and you're not getting it back


Art imitates life, that we all know. But what if art imitates your personal life, your personal likeness and does it so well that the line between what is real and surreal blurs?
Unbeknownst to us, we are becoming models for state-of-the-art AI technology that trains on terabytes of poorly filtered data scraped from all over the web. This data can include our personal photos, medical images, and even copyrighted content -- basically, anything ever posted online.
How far will you go to protect your personal data?


No longer shop with a brand? Pay more for goods and services from a company with a better privacy record? Stop using an app?
All of these and more are actions people are prepared to take if they find out organizations aren't keeping their data safe, according to a new report from DataGrail.
How to tell your customers that you've been hacked [Q&A]


The short-term costs of a cyberattack are significant. Investigating and containing a breach, rebuilding IT systems and implementing new security controls, as well as the loss of productivity, can all cause severe financial strain.
However, the long-term costs of a breach are often even more damaging. Enterprises that do not handle an attack well can suffer a number of further consequences, including reputational damage, a loss of customer loyalty and a drop in share prices.
What does cloud native security actually look like? [Q&A]


Cybersecurity is a priority for all enterprises. We regularly see news of data breaches across a wide range of industries, and as workforces increasingly move to a hybrid model the issue becomes more acute.
As businesses undergo digital transformation they need to update not only their tools but also their attitude toward keeping systems secure. We spoke to Pravin Kothari, executive vice president, product and strategy at cloud security company Lookout to find out why in a cloud-native world security needs a different approach.
Over 80 percent of companies have had cloud security incidents in the last year


According to a new report 81 percent of organizations have experienced a cloud-related security incident over the last 12 months, with almost half (45 percent) suffering at least four incidents.
The findings, from machine identity management specialist Venafi, reveal that the underlying issue for these security incidents is a dramatic increase in security and operational complexity connected with cloud deployments.
How to use data to anticipate consumer behavior [Q&A]


Businesses are starting to recognize the advantages of leveraging data-driven approaches to improve customer experience. These approaches are also hugely valuable when included in strategic roadmaps to increase engagement and return on investment.
Analytical data is ideal for businesses wanting to assess the needs of their target customers to deliver personalized experiences and attain more accurate forecasting and demand planning. Moreover, data from analytics promotes more effective inventory and supply chain management, compounding supply and fulfillment issues businesses are currently experiencing
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.