The biggest security concerns facing businesses are data leaking through endpoints (27%), loss of visibility of user activity (25%) and maintaining compliance with regulatory requirements (24%), DTEX Systems reveals. These concerns are followed by access from outside the perimeter (23%) and remote access to core business apps (18%) such as email and collaboration. Few companies…

A recent survey revealed that, on average, organizations must comply with 13 different IT security and/or privacy regulations and spend $3.5 million annually on compliance activities, with compliance audits consuming 58 working days each quarter. As more regulations come into existence and more organizations migrate their critical systems, applications and infrastructure to the cloud, the…

Increasingly demanded by consumers, data privacy laws can create onerous burdens on even the most well-meaning businesses. California presents plenty of evidence to back up this statement, as more than half of organizations that do business in California still aren’t compliant with the California Consumer Privacy Act (CCPA), which went into effect earlier this year….

2020 trends in SOX compliance

SOX & Internal Controls Professionals Group released a survey which measures the costs, execution, challenges and priorities faced by companies that comply with the Sarbanes-Oxley Act (SOX). SOX compliance trends “In its fifth year, our survey reflects the broad experience of SOX professionals over time and presents a balanced perspective of the current state of…

Back in March as the coronavirus pandemic gathered steam in the U.S., a largely unheralded video-conferencing service suddenly found itself in the spotlight. And just as quickly as Zoom became a household name for connecting work colleagues, church and school groups, friends, family, book clubs and others during stay-at-home lockdowns, it also gained a reputation…

A desire to remain compliant with the European Union’s General Data Protection Regulation (GDPR) and other privacy laws has made HR leaders wary of any new technology that digs too deeply into employee emails. This is understandable, as GDPR non-compliance pay lead to stiff penalties. At the same time, new technologies are applying artificial intelligence…

Czech, US to Cooperate on Security of 5G Networks

The Czech government office said the document was signed remotely by Czech Prime Minister Andrej Babis and U.S. Secretary of State Mike Pompeo. The signing comes amid a global battle between the U.S. and China’s Huawei, the world’s biggest maker of network infrastructure equipment. Huawei has become the target of U.S. security concerns because of…

Despite spending more on compliance, businesses still have basic IT weaknesses

There is a misalignment between data privacy regulation spending and business outcomes, according to Tanium research. Specifically, as businesses spend tens of millions on compliance, over 90 percent have fundamental IT weaknesses that leave them vulnerable and potentially non-compliant. The global study of 750 IT decision makers revealed that organizations have spent on average $70.3…

The move brings together the largest mobile operating systems in an effort to use smartphone location technology to track and potentially contain the global COVID-19 outbreak. The move would allow apps to be created enabling smartphones powered by Apple software and Google-backed Android operating system to exchange information with a joint “opt in system” using…

Effective Data Security Begins With a Strong Tech Foundation

Data is the engine of the modern economy. Whether it consists of customer data, intellectual property, market insights or financial information, these types of sensitive data enable the most successful businesses to thrive. It’s no surprise, then, that securing that critical data is increasingly a strategic priority for organizations around the globe. Not all organizations,…