Data breaches in the U.S. are on the rise, with millions of individuals impacted: According to the Identity Theft Resource Center, the number of data breaches from January to September 2021 (1,291) exceeded the number of attacks during all of 2020 (1,108). It’s possible that number is even higher because many companies often don’t disclose data breaches. Most […]
The 2021 Year in Review and What to Expect in Data Security in 2022
This year saw a number of significant changes on both the state and federal levels with regard to data privacy and data security. These changes reflect the increasing focus on the digital landscape to which the global economy has shifted and emphasized a much sharper focus on protecting sensitive information. Indeed, the significance of having strong cybersecurity […]
Is Air-Gapped Backup Necessary for Effective Data Protection?
Air-gapped backup is becoming increasingly popular in the backup and disaster recovery (DR) industry. Most backup and DR vendors are already offering it as an integrated feature or in the process of including it in their solution(s). The biggest driver for air-gapping is the increasing number of cyber threats such as ransomware. Ransomware attacks have […]
The Architecture of Cyber Recovery: Cyber Recovery Vaults
Do a Google images search for “vaults” and you’ll get a quick visual tour of architectural history, a display of the varied designs of bank safes created to secure cash and other valuables, and even an introduction to gymnastic vaults. Each of these provides a dynamic vision of what a “vault” is and of its physical presence. […]
Don’t Just Let It Go: Protecting Your Data This Holiday Season
In 2014, my daughter was 10 and was deep in the throes of Frozen-mania. A certain song became seared in all our brains. Disney’s billion-dollar juggernaut consumed every waking moment, and my daughter wanted an Elsa doll to share the experience with. It turned out that she was not unique in her interest, and Frozen merchandise was sold out […]
A New Era of Risk: Data Security Through Modern Authentication Technologies
IT professionals are still struggling to manage the risks brought about by remote work with their existing data security tools. Remote access went from being considered a workplace exception to the default model for large swaths of employees seemingly overnight. However, the considerable strain remote access puts on information security environments continues to be felt. […]
2022 Predictions: Embracing Low-Code Security Automation
There was one headline-grabbing breach after another this year. As we head into 2022, we sat down to reflect on 2021 in order to predict what key themes enterprises should expect to see in the new year. Amid rising threats and an ongoing skills shortage, we believe companies will increasingly embrace low-code security automation in […]
A Guide for Nonprofits on Donor Data: How and What Kind of Data to Track
Donor data is a key tool used by nonprofits to grow in the future and ensure their sustainability. It is not just a simple digital file folder. Nonprofits must use donor data to recognize new prospects and opportunities if they hope to continue their important mission. Using donor data conscientiously can increase donations and ensure […]
Why Small Businesses Should Invest in Cyber-Insurance
Recent headlines are rife with reports of hackers wreaking havoc on U.S. companies and small businesses. One important step that’s particularly critical for small businesses to take is to invest in cyber-insurance, also known as cybersecurity insurance. The U.S. government’s Cybersecurity & Infrastructure Security Agency describes the purpose of cybersecurity insurance as “designed to mitigate losses from […]
How AI Is Paving the Way for Improved Surveillance and Cybersecurity
Cybersecurity is increasingly leaning towards artificial intelligence (AI) to help mitigate threats because of the innate ability AI has to turn big data into actionable insights. Rightly so, because the threat to data security is real, and across all industries. For instance, while there were fewer than 50 million unique malware cases in 2010, the number had […]