Employees biggest IT threat to businesses
Despite British small and medium sized enterprises (SMEs) providing training in IT and security, employees fail to prevent breaches and data leaks, according to McAfee. Even …
Failed backups endanger revenue and productivity
SMBs are losing critical business information as a result of failed backups, and have suffered significant impacts as a result, according to GFI Software. Many IT …
Businesses not fully implementing infosec programs
Many U.S. small businesses are taking a passive approach when it comes to protecting their data leaving themselves vulnerable to data loss and possible financial and …
Key obstacles to effective IT security strategies
Drawing on data gathered from a total of 3,037 individuals – 1,944 technicians and 1,093 executives – in the United States, Canada, United Kingdom, Australia, …
Account takeover attempts have nearly doubled
ThreatMetrix announced its Cybercrime Index, a series of Web fraud data aggregated from 1,500 customers, 9,000 websites and more than 1.7 billion cyber events. In a recent …
It takes 10 hours to identify a security breach
Businesses are vulnerable to security breaches due to their inability to properly analyze or store big data, according to McAfee. The ability to detect data breaches within …
Worldwide security market to grow in 2013
As companies continue to expand the technologies they use to improve their overall security, the worldwide security technology and services market is forecast to reach $67.2 …
Most enterprises have no information strategy
Less than 10 percent of today’s enterprises have a true information strategy, according to Gartner, Inc. Recent research by Gartner has found that, just as business …
How businesses prepare for disasters
With fears of potential security breaches and natural disasters like Superstorm Sandy and the recent Oklahoma tornado weighing heavily on IT executives, businesses nationwide …
Big data is a big priority
NGDATA shared the results of their survey executed in co-operation with Clear2Pay – sharing insights from 183 global bankers around issues like the monetization of …
What are users doing after log-in?
Businesses today use up to 50 on-premises applications and 25 cloud-based applications on average, so identity and access management (IAM) technologies to secure data and …
Backup and recovery problems exposed
A Veeam survey of 500 SMBs across the USA and Europe found that they are experiencing significant issues with the cost, complexity and lack of capabilities of their data …
Featured news
Resources
Don't miss
- Attackers hit MSP, use its RMM software to deliver ransomware to clients
- Why data provenance must anchor every CISO’s AI governance strategy
- Woodpecker: Open-source red teaming for AI, Kubernetes, APIs
- Hottest cybersecurity open-source tools of the month: May 2025
- Microsoft, Dutch security agencies lift veil on Laundry Bear cyber espionage group