It seems that the data security landscape is constantly changing. Every day, new threats arise and fresh best practices emerge to keep companies at the forefront of protecting sensitive information. PKWARE’s staff of experts in data security share their thoughts in our blog, highlighting the most current topics on data security, management, and reduction. Check back frequently and join the conversation.
Virtualization is a highly effective method for increasing the efficiency and availability of physical IT infrastructures, and reducing traditionally high fixed infrastructure costs. According to leading research firms, as many as 95% of enterprises are using some form of virtualization. Today, orga...
The value of physical data backup methods is that they are frequently considered more secure than their virtual or web-connected counterparts. However, that logic may be giving organizations a false sense of security and raising the risk of information loss.
One financial institution recently learn...
Yes, at face value “Bring Your Own Device” programs seem like an excellent deal…employee purchases wireless device, not us. But, not so fast, there’s a host of security and compliance costs associated with mobile BYOD. Typically, BYOD brings the iOS® iPhone® and iPad®, BlackBerry®, and Android™ tabl...
Alarming Research
According to the 2010 Annual Study: U.S. Cost of a Data Breach by Poneman Institute, a Michigan-based research center that studies privacy, data protection and information security policy, security breaches cost $214 per compromised record and average $7.2 million per data breach ...
The bring-your-own-device trend has inspired many debates over how well data is protected in the modern business world.
The bring-your-own-device trend has inspired many debates over how well data is protected in the modern business world. Experts continue to argue over whether mobility can truly b...