The IT security group within every corporation is under file. Relentless cyber-attacks, user errors and improperly designed and implemented processes and procedures contribute to a maelstrom of problems that executives expect to be instantly solved. The news for IT departments continues to sound dire. Companies like Symantec estimate that 56% of employees believe it is […]
Sage data breach highlights need for least privilege access and two common errors businesses make, warns Hypersocket Software
The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control. The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised […]
Access all Areas?
Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]
The BYOD explosion: How much of a threat do personal devices really pose to your network?
How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]
Integration Point: Password Manager and Digital Transformation
Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]