Search
Close this search box.

Blog

Ransomware von Phishing übertroffen, aber noch nicht ganz ausgemerzt

Mehreren jüngsten Umfragen zufolge hat Phishing Ransomware als größtes Sicherheitsproblem für IT- und Sicherheitsmanager übertroffen. Keine einzige Ransomware steht so im kollektiven Bewusstsein wie Locky im Jahr 2016. Aber lassen Sie sich nicht täuschen: Ransomware geht es weiterhin allzu gut. Jüngste zielgerichtete Ryuk-Angriffe haben Unternehmen verstärkt ins Visier genommen, wie

Read More >

Data Classification Fail: Data Stolen at Apple Car

Confidentiality Oaths and Stolen Secrets As Bloomberg first reported, an Apple Inc. engineer has been charged with stealing data from the company that contained car secrets for a prototype driverless car. Jizhong Chen had been working for Apple for about six months, signing a strict confidentiality oath upon being hired.  According to another Apple

Read More >

Buying Email Security for Office 365 Has Gotten Harder

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right. Over the last few years, the way businesses use technology has undergone a complete transformation, driven by two major trends

Read More >

Opt-In or Opt-Out: Which Route Should Your Organization Go?

The General Data Protection Act (GDPR) launched a worldwide conversation on data security and consumer data protections. As historical data breaches continue to happen on a way-too-frequent basis, and data privacy legislation expands across the globe, companies are taking a harder look at their privacy policies and their obligations under each

Read More >

CCPA Readiness Checklist: Are You Protected?

he California Consumer Privacy Act of 2018 (CCPA) becomes effective January 1, 2020, but organizations must have certain data protection policies in place now to comply with the new legislation. Modifications to current procedures and a solid understanding of legal requirements are essential to CCPA compliance.    The CCPA increases

Read More >

GDPR in 2019: We’ve Only Just Begun

E-mails, pop-ups, and opt-out messages flooded inboxes and browsers in 2018 as companies began to worry about consent governance and privacy regulation – and the business impact of non-compliance. The General Data Protection Act brought awareness and attention to data privacy across the world. When GDPR went into effect in

Read More >

How to Protect Your Office 365 Email Users from Phishing

Phishing emails targeting Office 365 customers are the top source of security breaches, according to survey data. In case you missed it, in 2018 phishing officially the top concern for IT and security managers who have deployed Office 365 at their companies, having eked past ransomware according to a cybersecurity

Read More >

Was Sie tun können, um Office 365-E-Mail-Benutzer vor Phishing zu schützen

Phishing-E-Mails, die Office 365-Kunden anvisieren, sind Umfrageergebnissen zufolge die führende Ursache von Sicherheitsverletzungen. Falls Sie es verpasst haben: 2018 wurde Phishing offiziell zur Hauptsorge von IT- und Sicherheitsmanagern, die Office 365 in ihren Unternehmen bereitgestellt haben. Phishing übertraf laut einer Cybersicherheits-Umfrage von Osterman Research, die wir hier besprochen haben, Ransomware

Read More >