Please turn on your JavaScript for this page to function normally.
Safeguarding your data from human error and phishing attacks with the cloud

This is the third article of a series, the first article is available here, and the second one is here. In a world of ransomware attacks, companies should prepare for the …

Privacy laws do not understand human error

In a world of increasingly punitive regulations like GDPR, the combination of unstructured data and human error represents one of the greatest risks an organization faces. …

Solving the cloud infrastructure misconfiguration problem

Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents …

Awareness and tendency towards risky online behavior

‚ÄčSpanning Cloud Apps announced the results of a survey of over 400 full-time U.S. employees on their awareness of and tendency towards risky online behavior. The study …

Red door
Data breach reports to Information Commissioner increase by 75%

The number of reports of data security incidents received by the Information Commissioner (ICO) has increased by 75 per cent over the past two years, according to new analysis …

Analysis: Reported data breaches in Australia

The Office of the Australian Information Commissioner (OAIC) has published the first full quarter report on data breaches that fall under Notifiable Data Breaches scheme and, …

thumb up
Why people are at the heart of your information security success

In this podcast, Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4, talks about the human side of security. Are humans the weakest link? Why do people fall for …

State of security: Human error and remembering the essentials

It seems that in a sea of complex digital ploys, companies are trying so hard to guard against the next big threat that they have forgotten the basics. From years of extensive …

Human error reduces security offered by encryption apps

Crypto phones – whether they are hardware devices or mobile apps – are a great way to assure that your VoIP communications remain private, but the security and …

Don't miss

Cybersecurity news