5 Criteria for Choosing the Right Managed Security Services Provider (MSSP)
Organizations can choose to work with an MSSP for several reasons, such as security talent shortages, restricted IT budgets, the complexity of staying on top of sophisticated threats and a bewildering number of technology choices. Part 9 of our Definitive Guide to Data Loss Prevention series provides 5 criteria for selecting the right MSSP for your business.
What is a Whaling Attack? Defining and Identifying Whaling Attacks
Learn about whaling attacks as well as how to identify and defend against this social engineering technique in Data Protection 101, our series on the fundamentals of information security.
HHS: Ransomware Infections are (Probably) Reportable Under HIPAA
New guidance from the Office of Health and Human Services says that ransomware infections affecting health information are breaches that must be reported under HIPAA.
Analyze, Assess, Report: A Guide to Risk Assessments for Data at Rest
Regular data security risk assessments are a core component of many regulatory compliance requirements, internal policies, or confidentiality agreements. Follow this guide for an effective, phased approach to data at rest risk assessments.
The Evolution of an Insider Threat: How a Business Analyst Turned into a Rogue Hacker
The Advanced Threat & Analysis Center (ATAC) team here at Digital Guardian are on high alert for any suspicious activity that is generated from our customer environments through our Managed Service offering. Most times we’ll detect external cyber-attacks and/or intrusions, however recently we came across a rather interesting finding that was almost too good not too share with our readers.
Positioning DLP for Executive Buy-In
Data protection projects involve several departments within an organization, from IT to marketing. Learn how to build allies and properly position DLP to decision makers in part 8 of our series, The Definitive Guide to DLP.
Should Ransomware Infections Count As Data Breaches? (Yes.)
A proposal circulating in Congress would classify ransomware infections in healthcare settings as de-facto breaches. Fair? You betcha.
Android Security Evolves, But Still Trails the iPhone
The Android versus Apple argument has become this decade’s version of the PC versus Mac or Magic versus Bird debates. The people on both sides are entrenched in their positions, and trying to tell an Apple user about the benefits of Android, or vice versa, is likely to start a bar fight. Or a Twitter beef at the very least.
Building a value-based business case for DLP
You understand the need for data protection, but how do you pitch that idea internally to get the political and financial support that you need? The key to making a value-based business case lies in positioning DLP initiatives in terms that executives will understand. Learn more in part 7 of our Definitive Guide to Data Loss Prevention series.
Ransomware Moves to the Next Level
If you’ve been paying any semblance of attention lately, you’ll know that the level of ransomware activity is reaching epidemic levels. It’s pretty much out of hand, honestly. And, unfortunately there doesn’t seem to be any great defensive hope on the horizon.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.