Human-centric security in financial services organisationsSep 18, 2017, 14:06 PM Ben Gane
Security has never been more important than it is today, and at the same time, the needs are not being met by current approaches. Breaches have risen in scale and proliferation, costing businesses millions...
How Warehouse Mobility Is Like CybersecuritySep 18, 2017, 14:06 PM Ben Gane
I can almost hear the voice in your head as you read this. “How what is like cybersecurity?” Fear not. There are similarities between warehouse mobility and cybersecurity, and they are not only interesting, but relevantly illustrative. Really. But first, a bit of background.
How to start preparing for GDPR in seven easy stepsSep 18, 2017, 14:06 PM Ben Gane
The last time the EU undertook a major change to data privacy laws was 1995 and less than 1% of the world’s population was online. Today, 49% of people are online, and on May 25, 2018, the EU will begin enforcement of...
How to Secure Your EnterpriseSep 18, 2017, 14:05 PM Ben Gane
Over the past decade, the threat landscape has evolved extensively from the beginnings of worms in 2001 to botnets and spyware in 2005. Now, targeted attacks, mobile threats and destructive crypto-ransomware are a daily reality...
How to Remind Users to Change Their Passwords before They ExpireSep 18, 2017, 14:05 PM Ben Gane
Many best practices require regular password change to harden the security of corporate data and critical systems against insider and outsider threats. But if users ignore notifications to change their passwords, or don’t get them at all...
How to protect against ransomware like WannaCrySep 18, 2017, 14:05 PM Ben Gane
Unless you spent a long weekend wandering in the woods, you have most likely heard of the massive global ransomware attack, “WannaCry.” Details continue to emerge, but much of what we are learning is troubling...
How to keep your data safe while surfing the webSep 18, 2017, 14:04 PM Ben Gane
Although packet switched networks were under research as early as the 1960s, only in the late 80s was the Internet released to the public for business activities. The internet has since grown from half a million email users in 1990...
How to Detect Who Deleted a File from Your Windows File ServersSep 18, 2017, 14:04 PM Ben Gane
Why It Is Important If a file on your server is deleted maliciously or by mistake, it can lead to losses of sensitive data and the inability of users to access the information they are intended to use, both of which may result in additional troubles for IT staff...
How to collect forensic evidence in a mobile worldSep 18, 2017, 14:03 PM Ben Gane
In 2017, Forensic investigators must have the tools to collect evidence from a diverse set of mobile apps. Data from eMarketer shows that, on average, US adults spend 2.5 hours/day on apps. They use 20 different...
How to collect forensic evidence in a mobile worldSep 18, 2017, 14:02 PM Ben Gane
In 2017, Forensic investigators must have the tools to collect evidence from a diverse set of mobile apps. Data from eMarketer shows that, on average, US adults spend 2.5 hours/day on apps. They use 20 different apps each...