From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization’s best defense is to plan for business continuity and disaster recovery by using processes that guide organizations to possibly prevent and/or better manage an (unpredictable) disruptive event.
Phishing is a critical security issue that can trick even the most diligent, security-minded users. How do you protect your organization from being another phish in the sea? Let’s start by understanding how phishing works and then move on to practical pointers to avoiding biting the bait.
This October is the 15th annual National Cybersecurity Awareness Month (NCSAM), an initiative to raise awareness about the importance of cybersecurity that grows stronger by the year in significance and scope. This is no surprise given that breaches and malware attacks are getting more frequent, and they don’t discriminate against industry. A cross-section of companies from government, healthcare, finance and retail to nonprofits, car-sharing, and even the Port of San Diego have faced ransomware attacks.
At the beginning of 2018, the FBI and the Department of Education Inspector General revealed that hackers had tried to sell over 100 million private records from almost 100 schools and businesses as of the end of last year. 100 million records seems like a lot, but when you consider that more than 63 percent of organizations experienced an attempted ransomware attack in 2017, with 22 percent reporting these incidents occurred on a weekly basis, it’s easy to see how pervasive and far-reaching the threat of ransomware is.
On June 28 2018, California Governor Jerry Brown signed into law AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute, seen as one of the toughest privacy laws in the United States, will require companies to tell California residents what information is being collected and how it’s used. You have 18 months to get ready.
Ransomware attacks are increasing, getting more sophisticated and sparing no industry. In this blog we examine both sides of a ransomware attack — ways to prepare a solid defense (or offense) to prevent an attack and pointers to repair the damage if you do suffer an attack.
We’ve made it all the way to number 10 in our blog series, and just in in time for Friday, May 25, 2018, the date the GDPR will become enforceable. But relax, we’re here to provide you with peace of mind in the last blog of our GDPR series with tips and pointers to keep you GDPR compliant — on May 25, and beyond.
In the last three blogs of our GDPR series, we examine the impact of the GDPR on your organization, Spanning and SaaS providers in general. In blog #9 in the series, we take a look at our journey to GDPR compliance and provide you with tips for your own organization.
In our GDPR series to date we’ve analyzed the important directives and ways for you to be compliant with them. In our final three blogs, we examine the impact of GDPR on your organization, Spanning and SaaS providers in general. Read #8 for the impact of the GDPR on SaaS Providers.
We’re onto #7 in our 10-part GDPR blog series. In this blog post, we tackle Data Protection Impact Assessment (DPIA) and what it may mean for your organization. Read the entire GDPR series to get ready for 25 May 2018.