For organizations, email is the most critical tool for B2B communication. And while the move to web email reduces IT costs and affords employees better mobility, it also strips away productivity features available in thick-email-client applications.
The General Data Protection Regulation (GDPR) is a new law in the European Union (EU), set to come into force in May 2018. It will protect the rights of EU citizens in respect of their personal data. Any organization operating in the EU is required to comply with the new legislation.
Department of Defense (DoD) contractors and suppliers must ensure they are compliant with Defense Federal Acquisition Regulation Supplement (DFARS).
Denial of Service (DoS) attacks topped this year's list of security incidents in Verizon's Data Breach Investigations Report (DBIR), with 11,246 reported incidents and five confirmed data breaches.
You know what's going to happen. The unsuspecting user receives a phishing email. Some big brand company that should already have their data wants them to verify their details. The victim visits the verification link contained in the email. He/she is prompted to enter his/her login information into a fake verification form. After obtaining the person's ID and password, the hackers use their credentials, along with information on the victim's social media profiles, to figure out their corporate login information. Next thing you know, the network drives are automatically encrypting data, and all hell breaks loose.
If Microsoft Exchange Server is your enterprise platform for email, you likely have also deployed Microsoft Exchange Outlook Web to enable employees to access email, calendars and contact information via mobile devices and web browsers.
During the first few months of 2017, the health care sector was plagued by a variety of security incidents (see 10 of the biggest here). The theft of laptops and mobile devices are the gateway for several of these incidents. In most cases, the user had not password protected these devices even though they contained highly confidential patient data in the form of emails and email attachments.
Recently, The New York Times ran an article warning travelers to exercise the same degree of security over data on mobile devices as they would in protecting themselves from muggers. The warning comes in the wake of increased pressure by foreign and domestic governments for travelers to hand over devices and passwords because border agents have an interest in accessing the data on that device to determine the eligibility of the traveler for entry. When border agents confiscate a device, the data may be downloaded and stored for further scrutiny, thereby putting confidential corporate information at risk.
Seventy million cellphones are lost or stolen each year, and with Bring Your Own Device (BYOD) the new norm, it's no wonder mobile device security is top of the list for IT Security Professionals.