Healthcare organizations are frequently victimized by data breaches. Cybercriminals target this sector due to the type of information on record - information such as names, addresses, Social Security numbers can be the starting point for a credit card fraud scheme. A recent presentation from consult...
Virtualization is a highly effective method for increasing the efficiency and availability of physical IT infrastructures, and reducing traditionally high fixed infrastructure costs.According to leading research firms, as many as 95% of enterprises are using some form of virtualization. Today, organ...
Alarming Research
According to the 2010 Annual Study: U.S. Cost of a Data Breach by Poneman Institute, a Michigan-based research center that studies privacy, data protection and information security policy, security breaches cost $214 per compromised record and average $7.2 million per data breach ...
Technology professionals often have to come face-to-face with the reality that it may be impossible to establish a 100 percent secure system. Even with the best firewalls and antivirus solutions in place, weaknesses can emerge from improper configuration or out-of-date software versions. However, wh...
There is a common myth that regulation and compliance, such as PCI and Basil II, benefits data security. In other words, thanks to these mandates data is more secure …where it otherwise would not be. In reality, it quite possibly could make some organizations much less secure. How could a regulation...