The search found 3762 results.
Blog
The world of cybersecurity is rapidly changing. Hackers are getting smarter and more sophisticated, and in the age of remote work, globalization, and endless third-party connections, attack methods and motivations are changing. Organizations need to pay attention.
Blog
With Imprivata FairWarning, your organization will be equipped with the tools necessary to ensure compliance and keep your data safe from any prying eyes.
Blog
The numbers tell a scary story. When polled by Ponemon, 44% of organizations say they’ve experienced a third-party data breach in the last year. In addition, 65% of respondents have not identified the third parties with access to their most sensitive data and 51% stated that their organizations are not assessing the security and privacy practices of the third parties that are granted access to their systems.
Blog
E-commerce gives consumers convenience, selection, and the belief that their online purchase is secure. Regulations developed by credit card companies require business owners to ensure their point of sale (POS) and other network capabilities are maintained in a secure environment.
Blog
Rapidly developing technology means consumers in the finance industry look for fast, personalized service. These new opportunities drive business development—but they also drive the risk of data loss and non-compliance. In late 2017, consumer credit agency and data aggregator, Equifax, revealed a severe data loss caused by sloppy security measures.
Blog
Do you know how many vendors are accessing your network? Is someone in your organization following vendor movements in your system, and controlling their logins?
Press
Accomplished Healthcare IT Expert, Mark Clark, Appointed to Accelerate Growth in International Market
Blog
Caution is needed when granting any user access to your network. But you need to be really careful when providing privileged access to your network. What’s the difference?
Blog
As the deadline for compliance with the EU’s General Data Protection Regulation (GDPR) approaches, it is critical to remember you are liable for the compliance of your vendor partners as well.
Blog
With the rapidly growing number of sophisticated cyber-attacks, such as phishing and ransomware, single-factor authentication has had its day. One way to fight back against the rise in cyber-attacks is by using strong multi-factor authentication.