Blog

How to Monitor Google Drive Uploads from Corporate Endpoints

Insider theft and misuse are a major area of concern when it comes to protecting information and complying with security…

August 21, 2023

European data privacy regulation – what makes “personal data”?

Background In Europe, the first data privacy considerations were brought to the European Council's attention in 1980 as "The Organization…

August 21, 2023

2016 Ponemon Cost of Data Breach Study – The less obvious conclusions

The 11th edition of the 2016 Ponemon Cost of Data Breach Study presents an in-depth analysis of the cost of…

August 21, 2023

Eating out – no longer safe if you pay by card

Restaurants were not avoided by hackers in 2016, and the reason why is quite obvious: big restaurant chains run their…

August 21, 2023

Common ways of stealing data: Access token theft

Nowadays, 41 records are lost every second in data breaches usually caused by external attackers (according to Breachlevelindex), and the…

August 21, 2023

HIPAA: Can you prove your data has NOT been compromised?

Proof, rarely a concern Proof that the data was safe at a particular point in time is rarely a concern…

August 21, 2023

Common ways to steal data: Clear-text password dumps.

When counting lost records officially reported so far in 2016 in the US, 3.2 out of 4.7 Million were stolen…

August 21, 2023

File integrity monitoring – Are you doing it properly?

The integrity of system and configuration files of various services and applications is critical for building and maintaining secure IT…

August 21, 2023