logo
May 14, 2020 | Maurizio Taglioretti

GoDaddy Data Breach

GoDaddy, the world's largest domain registrar, has confirmed that 28,000 of customer web hosting accounts were compromised in a security incident in October 2019. GoDaddy has over 19 million customers, 77 million managed domains and millions of hosted websites. Here’s what you need to know about...
October 29, 2019 | Ryan Brooks

How to Prevent a Data Breach

Data breach prevention is a top priority for organizations of all sizes and across all sectors. A breach of sensitive information — whether it’s personal information like credit card and Social Security numbers, or proprietary information like intellectual property or financial forecasts —...
October 1, 2019 | Ryan Brooks

The Capital One Hack: 3 Questions about Data Security in the Cloud

Financial services company Capital One suffered a breach that exposed the data of roughly 100 million individuals in the U.S. and approximately 6 million people in Canada. The breached data included 140,000 U.S. Social Security numbers, 80,000 bank account numbers, and 1 million Canadian Social...
September 12, 2019 | Dirk Schrader

Top 12 Types of Data Security Solutions for Protecting Your Sensitive Information

Data security solutions are essential for all organizations today because they help prevent costly data breaches and business disruption. They are also vital for implementing the stringent data security controls required for compliance with regulations such as SOX, PCI-DSS, GDPR and CCPA. To...
July 23, 2019 | Ilia Sotnikov

Intellectual Property Theft: What It Is and How to Defend Against It

Many businesses rely on innovation and knowledge to beat the competition and achieve success. Their intellectual property (IP) is often their most valuable asset, and they consider it to be highly sensitive information. There are different types of intellectual property; they include copyrights,...
June 6, 2019 | Ryan Brooks

Who Is to Blame for a Data Breach? Answers to the Most Pressing Questions

The Netwrix 2018 IT Risks Report presents new research into the security threats organizations are facing and the actions they are taking to minimize IT risks. The report explores six IT risks: physical damage, intellectual property theft, data loss, data breaches, system disruptions and compliance...
May 2, 2019 | Matt Middleton-Leal

Let Us Close the Awareness-Action Gap in Cyber Security Together

Persuading non-IT personnel to respect information security policies and report on incidents has always been a challenge. Unfortunately, new research shows that there is still no cooperation between regular workers and IT departments in the UK. Overall 60% of respondents consider their colleagues...
March 12, 2019 | Ilia Sotnikov

Five Mistakes that Could Lead to a Third-Party Data Breach

In late January, we learned that millions of financial records were leaked from Texas-based data firm Ascension because its contractor, a New York-based document management startup, had misconfigured several Elasticsearch and Amazon S3 storage servers, leaving them with no password...
November 29, 2018 | Ryan Brooks

What to Know about a Data Security Breach

Data breach definition A data breach, or data leak, is a security event in which protected data is accessed by or disclosed to unauthorized viewers. A data breach is different from data loss, which is when data can no longer be accessed because of a hardware failure, deletion or other cause....
April 19, 2018 | Matt Middleton-Leal

GDPR Data Breach Notification: How to Report a Personal Data Loss

Originally published April, 2018 and updated June, 2019 The General Data Protection Regulation (GDPR) is a global standard designed to codify and extend the rights of data subjects. It came into force on May 25, 2018, replacing the European Data Protection Directive 95/46/EC (DPD) effective...
Show more articles
...