Resources

Blog

5 Steps to Deterring Insider Data Theft

The insider threat is something that every company must deal with, but effectively mitigating the risk of insider data theft can be difficult. Follow these 5 steps to drastically reduce the chances of insider theft at your company.
Blog

Can you "leak" public information?

The personal information on world leaders attending the G20 summit was accidentally released to a third party. Is it a data breach? Maybe not.
Blog

Law Firms: Cyber Criminals’ Next Top Target?

Without breach notification requirements in place, it can be hard to gauge the popularity of law firms as targets for cyber criminals. But if recent findings are any indication, the legal industry may well be the next lowest hanging fruit for attackers.
Blog

7 Ways to Lose Sensitive Data

With trends like BYOD, workforce mobility, and the adoption of cloud and web applications for business, there are more opportunities for sensitive data loss than ever before. Here are our top 7 ways that sensitive data is most commonly lost as well as tips for preventing data loss.
Blog

Why Managed Security Services?

Managed security services are becoming an increasingly popular option for increasing the value brought by security solutions while reducing IT complexity.
Blog

At Anthem: Where There’s Fire, There’s Smoke

After losing 80 million patient records, Anthem Healthcare is refusing to have its network scanned for vulnerabilities by a federal auditor, raising questions about the health insurer’s internal practices.
Blog

What is Application Control? Definition, Best Practices & More

Application control is a security practice that blocks or restricts unauthorized applications from executing in ways that put data at risk. The control functions vary based on the business purpose of the specific application, but the main objective is to help ensure the privacy and security of data used by and transmitted between applications.