The 5 most common reasons for corporate data loss

There is no doubt that one of the main assets of a company is the data it stores. Information about customers, employees and finances, among other types of records, should be adequately protected and available whenever they are needed. For this reason, companies that appreciate the value of their data, invest adequate resources into protecting them and recovering them … More The 5 most common reasons for corporate data loss

VerticalScope experiences major data breach: 45 million records stolen

VerticalScope has experienced a major data breach, with cybercriminals making off with over 45 million records belonging to over 1,100 websites, it has been reported. LeakedSource, which provides detailed information on data breaches, said that some of the websites impacted by this include Techsupportforum.com, MobileCampsites.com, Pbnation.com and Motorcycle.com. It is believed that the security incident … More VerticalScope experiences major data breach: 45 million records stolen

Decision makers at banks ‘in the dark’ about data breaches

Decision makers at banks are in the dark when it comes to data breaches at their organization, according to KPMG’s 2016 Banking Outlook Survey. It revealed that this is especially the case when it comes to the second tier of senior management. For example, while 12% of CEOs were unaware as to whether their networks … More Decision makers at banks ‘in the dark’ about data breaches

ESET releases new decryptor for TeslaCrypt ransomware

Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt. We have been covering this malware for a few … More ESET releases new decryptor for TeslaCrypt ransomware

After authentication comes authorisation and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply … More After authentication comes authorisation and access control