logo
July 6, 2020 | Maurizio Taglioretti

GoDaddy Data Breach

GoDaddy, the world's largest domain registrar, has confirmed that 28,000 of customer web hosting accounts were compromised in a security incident in October 2019. GoDaddy has over 19 million customers, 77 million managed domains and millions of hosted websites. Here’s what you need to know about...
July 6, 2020 | Ryan Brooks

How to Prevent a Data Breach

Data breach prevention is a top priority for organizations of all sizes and across all sectors. A breach of sensitive information — whether it’s personal information like credit card and Social Security numbers, or proprietary information like intellectual property or financial forecasts —...
July 6, 2020 | Ryan Brooks

The Capital One Hack: 3 Questions about Data Security in the Cloud

Financial services company Capital One suffered a breach that exposed the data of roughly 100 million individuals in the U.S. and approximately 6 million people in Canada. The breached data included 140,000 U.S. Social Security numbers, 80,000 bank account numbers, and 1 million Canadian Social...
July 6, 2020 | Jeff Melnick

Top 12 Data Security Solutions to Protect Your Sensitive Information

Data breaches are all over the news, and organizations are acutely aware that even if they have achieved PCI compliance or SOX compliance, new compliance  regulations like the GDPR demand more stringent data security controls. To help you improve your security and compliance posture, we have put...
March 27, 2020 | Ilia Sotnikov

Intellectual Property Theft: What It Is and How to Defend Against It

Many businesses rely on innovation and knowledge to beat the competition and achieve success. Their intellectual property (IP) is often their most valuable asset, and they consider it to be highly sensitive information. There are different types of intellectual property; they include copyrights,...
July 9, 2020 | Ryan Brooks

Data Security Explained: Definition, Risks and Technologies

More than ever, digital data security is on the agenda in many organizations. The focus on protection of sensitive or critical data, such as intellectual property and personal data, is a result of growing cyber risks and increasingly stringent data security regulations. Today, protecting...
July 6, 2020 | Ryan Brooks

Who Is to Blame for a Data Breach? Answers to the Most Pressing Questions

The Netwrix 2018 IT Risks Report presents new research into the security threats organizations are facing and the actions they are taking to minimize IT risks. The report explores six IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruptions and compliance...
July 6, 2020 | Matt Middleton-Leal

Let Us Close the Awareness-Action Gap in Cyber Security Together

Persuading non-IT personnel to respect information security policies and report on incidents has always been a challenge. Unfortunately, new research shows that there is still no cooperation between regular workers and IT departments in the UK. Overall 60% of respondents consider their colleagues...
July 6, 2020 | Ilia Sotnikov

Five Mistakes that Could Lead to a Third-Party Data Breach

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...
July 6, 2020 | Ryan Brooks

What to Know about a Data Breach: Definition, Types, Risk Factors and Prevention Measures

Data breach definition and types A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers. A data breach is different from data loss, which is when data can no longer be accessed because of a hardware failure, deletion or other...
Show more articles
...