What businesses need to know about data decay

What businesses need to know about data decay

Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer be easily understood, cannot be effectively leveraged and, therefore, lacks value.

Only 30% of enterprises use cloud services with E2E encryption for external file sharing

Only 30% of enterprises use cloud services with E2E encryption for external file sharing

A recent study of enterprise IT security decision makers (…) shows that majority of enterprises use additional encryption methods to boost the security of cloud collaboration and file transfer, however, tools with built-in end-to-end encryption are still less frequent despite the growing popularity of this privacy and security enhancing technology.

Confidence redefined: The cybersecurity industry needs a reboot

Confidence redefined: The cybersecurity industry needs a reboot

I’m sure many of us would like to leave 2020 behind and get back to our “normal” lives but, in some areas, I think that would be a mistake. Despite the challenges and obstacles we each faced during this time, we’ve collectively learned so much and owe it to ourselves and society to apply those learnings to create a better future.

Why isn’t cloud backup part of common security practices?

Why isn’t cloud backup part of common security practices?

The threat of ransomware is omnipresent, and the tactics deployed by cybercriminals are constantly evolving to wreak as much havoc as possible. Recent attacks like the one on Kaseya serve as an important reminder that when ransomware strikes, it’s not just your data that’s at risk, but your whole business.

How businesses can protect their brands and bottom lines against damage from illegal robocalls

How businesses can protect their brands and bottom lines against damage from illegal robocalls

March 17, 2021 was a milestone in the war on illegal robocalls. The FCC levied a $225 million fine — the largest in its history — on a telemarketer for making 1 billion illegal robocalls. On the same day, the FCC launched its Robocall Response Team, whose 51 staffers will step up enforcement and develop policies to help track down illegal robocallers. And finally, the FCC issued cease-and-desist letters to six voice service providers for allowing their networks to pass illegal robocalls.

Why cybersecurity products always defy traditional user reviews

Why cybersecurity products always defy traditional user reviews

I read with interest the latest batch of evaluation data from MITRE on various endpoint solutions, this time focusing on the detect, response and containment of these various solutions against malware created by FIN7 and CARBANAK threat groups. While academically interesting, it illustrates the difficulty in giving reviews to cybersecurity products in the endpoint protection category and trying to attribute a “best” label to a specific product in a specific category (be it endpoint or anything else).