ReportWire

Tag: data security

  • How to Handle Unsanctioned AI Tool Use at Your Company

    [ad_1]

    AI is undeniably useful for certain simple tasks, and more and more people are using it when searching for information, but not every company allows or encourages AI tool use in the office. That’s not stopping workers from using AI anyway, according to a new report. In fact staggering amounts of people may be guilty of using “shadow AI,” including executives and cybersecurity experts.

    The report comes from California-based cybersecurity outfit UpGuard, which surveyed 1,500 workers in the U.S., U.K. and other nations. Its most eye-popping result is that over eight in ten workers are guilty of using unapproved AI tools at work. Half of the respondents admitted they did this regularly. More embarrassingly, 90 percent of cybersecurity professionals surveyed by UpGuard do this too, despite the fact that they really should know better. 

    The report notes “regardless of company size, geography, industry, employee function or seniority, a sizable majority of workers use AI tools at work that they know are not approved.” The data show that regular use of “shadow AI” may be more common in smaller firms rather than larger corporations. Workers in financial firms, the information industry and manufacturing were also more likely to regularly use unapproved AI tools than people in healthcare, education and retail. 

    Why are workers doing this? It’s probably because their company either lacks any kind of AI use guidelines, has approved only a limited range of tools that workers may not find useful, or has banned AI use, tempting users who can see AI’s value from trying to lower their workplace burden by using the tools anyway.

    This confidence in AI may be driven by surprisingly high levels of trust in AI. The UpGuard report notes that about a quarter of workers surveyed said they felt the AI tools they used were their “most trusted source of information,” placing the level of trust almost level with the trust they have in their managers and higher than reported trust levels regarding their colleagues. UpGuard links this trust with greater AI use, noting that “employees who view AI tools as their most trusted source of information are far more likely to use shadow AI tools as part of their regular workflow,” news site HRDive noted

    Shadow AI use also isn’t confined to just frontline workers: midlevel managers were as guilty of using unapproved AI as low-level workers were, but UpGuard found that executives were reporting the highest use of unapproved AI tools, underlying once again the wide division between executives and their workforce. 

    Using unapproved AI tools may be risky because it typically involves accessing an externally-supplied third party service, which may even result in any inputs users make being used to train later AI models. So if someone uploads sensitive company data it may leak out to other users at a later date, or security lapses by a third-party supplier may expose sensitive information in other ways.

    UpGuard’s survey looked into this and found that despite widespread awareness of these risks, shadow AI users felt they could manage the situation safely. Meanwhile, fewer than half of the respondents said they understood their company’s AI use guidelines, and fully 70 percent said they knew that workers had shared sensitive data with AI models. This points to a training issue in companies rolling out AI — a problem previously reported on — where having the risks explained to workers isn’t enough to deter them from exposing the company to risk anyway.

    The big takeaway from this data for your company is clear: If you don’t have an AI use policy, it’s definitely time to get one. If you have one already then it’s time to retrain your workers on why it’s important to use only the approved AI tools, and to be very very careful in their choice of data shared with AI tools. Just chatting with your workers about why they’re using unsanctioned AI systems may also be useful, since it will show you if you’ve made the wrong choice in “official” AI tools, compared to the actual frontline tasks that your employees are using shadow AI to tackle.

    The final deadline for the 2026 Inc. Regionals Awards is Friday, December 12, at 11:59 p.m. PT. Apply now.

    [ad_2]

    Kit Eaton

    Source link

  • To Build a Successful Brand, Make Data Security Part of the Customer Experience

    [ad_1]

    Concerns over data security have never been bigger—and they’ve never been a bigger roadblock for brands trying to win over skeptical customers. The Identity Theft Resource Center found that in 2023 alone, 3,205 publicly reported data breaches in the U.S. affected over 353 million people.

    The rise of AI has made data security an even greater concern. Not only does AI enable more sophisticated attacks, but the large quantities of data available through LLMs present additional privacy concerns. As consumers prioritize data security more and more, making this a central part of the customer experience can become a valuable win for brands.

    Avoid collecting unnecessary data

    The amount of information most companies track can be truly astonishing. Personal identifying data—such as location, email address, and IP address—as well as engagement and behavioral data from all interactions with the company (including purchases and social-media activity) are just a few tracked data points. From website cookies and pixel tags to customer loyalty programs, call records, and even GPS tracking, data collection has become pervasive.

    As far back as 2015, the Harvard Business Review noted that this often resulted in companies collecting personal data they didn’t actually need on the off-chance they might be able to use it later. Even more problematic, this highlighted the mindset of asking for forgiveness rather than permission.

    This lack of transparency has eroded trust online. Globally, 63 percent of consumers feel companies aren’t transparent about data collection and use. Forty-eight percent have actually stopped using a company because of privacy concerns. Opt-out messaging should always be clear and easy to understand, so customers know what they are agreeing to. Otherwise, brands risk complaints and lost business later.

    To make data security part of your customer experience, the first step is to evaluate what data you collect and why. If it isn’t absolutely necessary, you’re probably better off not using it. Many brands even make this element of security awareness part of their cybersecurity marketing, reassuring customers that only essential information is collected.

    Take clear, actionable steps to protect collected data

    Regardless of the scope of the information you collect, you must take actionable steps to protect customer data every step of the way. Brands can and should implement a wide array of security practices to protect customer data and minimize the risk of a breach.

    Security tools like firewalls and antivirus software, as well as regularly updating and patching all systems and software to mitigate vulnerabilities, are an essential start. The use of such tools and systems can be regularly featured throughout the web or app experience. Even basic labels or badges highlighting which security tools you use will help build trust among consumers.

    Of course, brands also need to account for human error—both that of their employees and their customers. Human error is consistently cited as the top cybersecurity risk, whether through phishing scams, weak passwords or other issues.

    In a customer-facing environment, brands can further protect customer data through steps such as requiring complex passwords or biometric logins. Brands should also monitor for potential phishing attempts and warn customers about fraudulent imitators. 

    Helping individual customers protect themselves can be just as important as broad-ranging initiatives to protect a company’s entire data set. Even when user error is to blame, customers are likely to lose trust in the business if their personal data is stolen. 

    Tell your customers

    If you want to win big, you need to spread the word about your data security efforts. Don’t hide this information away. Clearly communicate your commitment to data security, including the specific steps you take to protect your customers. Full transparency and actively broadcasting this information is what will turn data security into a winning force for your brand.

    Of course, you must also ensure that your actions consistently align with what you tell your customers. Gaining trust is hard, but losing trust is easy. Any changes to your data security practices should be proactively communicated to your customers. 

    Cisco research reveals that 81 percent of customers feel that how a company treats client data shows the level of respect they actually have for their customers. Many brands spend thousands or millions of dollars on messaging to tell their customers that they care—but then their actions regarding data security paint a different picture.

    Data security can be a powerful differentiator

    While advances like interactive content may seem flashier and more exciting, data security should remain a top priority as you look for ways to improve your customer experience. By focusing on the needs of your audience and taking actionable steps to protect the data they share with you, you can build trust in a way that helps create lasting loyalty for your brand.

    The opinions expressed here by Inc.com columnists are their own, not those of Inc.com.

    [ad_2]

    John Hall

    Source link

  • SK tes Urges IT Leaders to Treat Retired Hardware as a Data-Security Priority

    [ad_1]

    This Cybersecurity Awareness month, SK tes, a leading provider of secure IT asset disposition (ITAD) and lifecycle services, is calling on organizations on take a closer look at one of the most overlooked cybersecurity threats: end-of-life IT equipment.

    While companies invest heavily in firewalls, endpoint protection, and threat detection, many fail to recognize the hidden risks lurking in their retired hardware. From hard drives to mobile phones, switches and routers, outdated devices often retain sensitive data that can be exploited if not properly managed.

    “Managing retired IT equipment isn’t just a logistical task, it’s a cybersecurity imperative,” says Tom Hoof, Group IT Director, “There are many examples of routers resold with corporate credentials still intact, and storage drives containing medical records end up in in second-hand markets. These are evidence of poor or missing processes and systemic risks.”

    Recent reports have highlighted worrying breaches:

    • Refurbished routers containing sensitive corporate information

    • Firewall devices leaking global configuration data

    • Hard drives with patient health information sold at public markets

    A common misconception is that factory resetting a device is a device is sufficient. It’s not. SK tes advocates for data erasure that meets recognized data destruction standards such as NIST 800-88 and the newer IEE 2883:2022, which require not just data destruction but also verification that data is irretrievable.

    SK tes warns that improper disposal of IT assets isn’t just a technical oversight, it’s a serious compliance risk. Mishandling retired devices can lead fo breaches of major global data protection regulations including GDPR, HIPAA, PCI DSS, NIS2 and DORA. These frameworks mandate strict controls over how sensitive data is stored, accessed, and destroyed.

    When hard drives, or other equipment containing confidential information are discarded without proper sanitization, companies risk leaking personal health data, financial records or proprietary business information. The consequences can include hefty fines, legal action, and irreparable damage to brand reputation and customer trust.

    This Cybersecurity Awareness Month, SK tes urges IT leaders, compliance officers and procurement teams to ask: “Do we know where our retired assets are, how they are being managed and what’s still on them?”. Mishandling this technology, from USB drives to laptops to servers, can lead to serious consequences.

    To help organizations navigate this critical phase of the IT lifecycle SK tes is offering a free 8-point Checklist for Secure IT Asset Disposition. This practical guide outlines essential steps to ensure data is properly wiped, verified and disposed of in line with industry standards standards. Visit www.sktes.com to download the checklist.

    About SK tes:
    Since our formation in 2005, SK tes, a subsidiary of SK ecoplant, has grown to become a global leader in sustainable battery recycling and technology lifecycle services. We provide comprehensive services for battery recycling, extracting scarce materials from used batteries at purity rates high enough that they can be reused in the manufacturing supply chain.

    SK tes has over 40 owned facilities across 22 countries offering unmatched service-level consistency, consistent commercials, lower logistics costs, local compliance experts in-region, support in local time zones and languages, and a deep understanding of transboundary movement globally.

    For more information about SK tes and global capabilities, please visit our website www.sktes.com.

    Source: SK tes

    [ad_2]

    Source link

  • The Shocking Cost of Vendor Data Breaches | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Modern supply chains are a complex web of interconnected, intertwined digital ecosystems, each supporting the other. Look around you, and everything from how your workstations perform to how your data is being managed consists of several different suppliers and vendors, beyond what might be evident to you on first glance.

    You may have bought your web domain from an American company, but your hosting servers are in Europe. You probably bought your cloud infrastructure from AWS or Google, but your data is being stored in a remote village in Norway.

    Beyond what is visible lies a plethora of vendors and suppliers that work together like clockwork to make sure your business infrastructure remains up and running.

    However, this is where the problem begins. A single outage, data breach or fault with one of these vendors can have a devastating ripple effect on your business operations.

    Your direct vendor might not even be responsible, but their service might depend on a third-party provider, with whom you have no connection, and yet, your business takes the complete brunt of the situation.

    Therefore, in today’s world, companies don’t just have to prepare for internal data risks but also think about the data risks posed to their suppliers and vendors.

    Related: How to Mitigate Cybersecurity Risks Associated With Supply Chain Partners and Vendors

    Vulnerabilities due to a web of interdependencies

    In 2021, millions of websites across the world suddenly went offline. This included business websites, banks, ecommerce ports and even government agencies. In fact, it took out a major chunk of European and mostly French websites.

    After a couple of hours, it was found that one of the four data centers owned by the company OVHcloud was destroyed due to a fire.

    While the data centers supposedly had backups, the resulting damage in terms of data breaches and lost business cost tens of millions of dollars.

    Even some of the largest companies in the world are regularly attacked and are susceptible to data leaks.

    Orange Belgium‘s data breach exposed information of 850,000 customers. Allianz Life‘s data breach exposed personal information of more than a million customers, and a Qantas cyberattack leaked information on over six million airline customers!

    More recently, a ransomware attack on the UK’s NHS (National Health Service) disrupted blood tests across several London hospitals, eventually leading to the death of at least one patient. The software provider for the NHS, Advanced Computer Systems, was eventually fined £3 million, but only after an innocent life had already been lost.

    While these large organizations cannot be solely blamed, it is clear that even if you have the most robust IT and security infrastructure within your organization, you are never immune to the vulnerabilities of your vendors.

    Common mistakes that lead to weak data management

    Similar to the example of OVHcloud, many vendors simply lack a robust backup system to ensure operations run smoothly — this is where the problem starts. Due to a poor backup system, they also have an insufficient disaster recovery plan in case of a ransomware attack. Therefore, a fire in only one of their four data centers brought down millions of their customers’ websites.

    Another example might be the NHS’s software. They probably had data integrity checks built into their security, but they were insufficient, making it easy for an attack to take place across a number of locations. Overall, a reliance on manual recovery efforts and weak cybersecurity practices creates vulnerabilities that can have devastating consequences.

    Related: 3 Ways to Ensure Cybersecurity Is a Priority for the Companies You Partner With

    Cost of a vendor data crisis

    Any data breaches or attacks on your vendors will have a direct impact on your business. It can directly result in operational downtime, which can include workflows that completely stop working, supply chain disruptions, invoicing issues and much more.

    In the short run, it can lead to lost sales, SLA breaches and even penalties, while in the long run, the financial impact due to reputational damage can be even worse. If customers can’t trust you to deliver on time or protect their data, they might never return.

    It’s important to safeguard your business against such scenarios, and there are a couple of steps that can help you mitigate these.

    How to mitigate a vendor data crisis

    Before signing a contract with a vendor, it’s important to do your due diligence and assess their data and security infrastructure. This might seem instructive, but it is one of the important first steps you can take to protect your business and data against vulnerabilities.

    It is also important to carry out regular audits and ensure SLAs are met and that they are up-to-date with industry standards.

    Overall, there needs to be a plan for diversification so that no single vendor can impact a critical workflow.

    Related: Why Cybersecurity is the Key to Unlocking the Full Potential of Supply Chains

    Why it’s important to have robust data recovery tools

    Despite all the due diligence and backups, no system is 100% fail-proof. This is why your business must have reliable recovery tools that can help recover damaged files, important emails and even complete databases, making sure your organization can be back on its feet as soon as possible.

    A company’s data can be worth tens of thousands of dollars for a small business and much more for a larger organization. Using such software is the perfect safety net when prevention fails.

    Modern supply chains are a complex web of interconnected, intertwined digital ecosystems, each supporting the other. Look around you, and everything from how your workstations perform to how your data is being managed consists of several different suppliers and vendors, beyond what might be evident to you on first glance.

    You may have bought your web domain from an American company, but your hosting servers are in Europe. You probably bought your cloud infrastructure from AWS or Google, but your data is being stored in a remote village in Norway.

    Beyond what is visible lies a plethora of vendors and suppliers that work together like clockwork to make sure your business infrastructure remains up and running.

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Chongwei Chen

    Source link

  • Why It’s Time to Rethink the Health Data Economy | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    One of the most valuable commodities of our time now flows through our algorithms, powers the devices tracking our movements and fuels the newest health innovations — our data.

    The list of items tracked is staggering, ranging from every step we take to our heartbeats and everything in between.

    These moments are fueling a booming healthtech economy built on a skewed exchange: People generate data, and companies extract the value.

    Related: Why Proactivity With Data Security and Privacy Is More Important Than Ever — and How to Be on Top of It

    Under pressure

    However, that architecture is cracking. Almost 193 million people are estimated to have been affected by the largest healthcare breach on record, the 2024 Change Healthcare attack. In 2024 alone, at least 14 data breaches hit one million patient records, with almost 238 million people exposed across these incidents. If our most valuable asset can leak at that scale, it would be fair to say data extraction isn’t just a moral grey area, but it’s operationally unsound as well.

    In recent times, consumers have begun telling founders what they want instead: control. In April 2025, Pew reported 55% of U.S. citizens wanted more personal control over how AI is used in their own lives. This showcases a demand for agency in the new systems shaping our healthcare choices.

    There is one fundamental thing entrepreneurs and founders should understand when building healthcare platforms today — treating your contributors as stakeholders rather than subjects will go a long way.

    This means building products and policies where value flows inwards, not just outwards. The form can be as direct as paying for contributions, or strategically, by granting early access to features, premium analytics and dashboards or credits that unlock opportunities in research and care.

    The bottom line is alignment. Richer, more consistent streams of high-quality data are generated when people feel they have an element of ownership. This richer data makes better algorithms, and better algorithms deliver products that justify the relationship.

    Transparency is the friend of alignment

    Make the data flows legible in the product: Tell people what you collect and why, where it goes and how long it stays there. Replace vague consent boxes with optional permissions that let a person authorize one use of their data and decline another, and show, in the product, how those toggles change access. When people can see and steer the flow, privacy stops being a legal document and becomes an experience.

    Private companies are not the only ones who can benefit from implementing such systems, with public-sector research leaning into the same logic. The NIH’s All of Us program is designed to return value to participants while opening access for researchers. It has more than 866,000 participants, creating one of the most diverse health datasets in the world. It is clear that when participation is treated as a partnership, rather than a data grab, both the company and the individual benefit.

    Related: What Brands and Consumers Can Do to Build a Privacy-First Digital Future

    Ownership models

    Switzerland is a great example of why ownership models matter. The country’s MIDATA initiative enables individuals to maintain their own health records, contribute to research on their own terms and govern the platform as members.

    We see many companies built using blockchain technologies that often discuss delegating ownership of data, but traditional institutions can also take a leaf out of that book. You don’t have to tokenize anything to learn from that structure.

    The shift begins with the story you tell. Instead of asking users for data so you can build, reframe it, ask them to build with you, and allow users to share the value their data creates. Map your data flows and surface them in the product itself.

    By designing an incentive mechanism that is simple to understand and sustainable to manage, one that puts people at the center of the process, you will reap the rewards later and ensure you have the backing of your users as well.

    One of the most valuable commodities of our time now flows through our algorithms, powers the devices tracking our movements and fuels the newest health innovations — our data.

    The list of items tracked is staggering, ranging from every step we take to our heartbeats and everything in between.

    These moments are fueling a booming healthtech economy built on a skewed exchange: People generate data, and companies extract the value.

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Christopher Crecelius

    Source link

  • Passwords Won’t Secure Your Identity. Here’s What Will. | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    Digitization outpacing security

    Digitization has become deeply entrenched in the fabric of how we operate as a society on a global scale, with 5.56 billion people online today and 402.74 million terabytes of data generated on a daily basis. The dizzying numbers demonstrate the breakneck speed with which every aspect of our lives has taken a virtual shape, and with it, the proliferation of the conversation about how we secure the digital world we have created.

    With the current security measures in use, cybercrime is expected to cost over $639 billion in the United States this year, with the costs expected to balloon as far as $1.82 trillion by 2028. In light of such projected costs, the development of a secure infrastructure is a priority that requires immediate attention, one that could compromise digital identity if disregarded.

    Decentralize to prevent compromise

    The centralized databases of tech titans mean that there is one location, one source of truth, that if compromised, all that it contains is leaked, as was the case with the passwords that were leaked. If not a leak, then a ransomware attack that disrupts the systems on which our digital lives operate. This kind of disruption can cascade to fundamental services such as healthcare, as a recent ransomware attack caused a system-wide tech outage at a large network of medical centers in Ohio, cancelling inpatient and outpatient procedures.

    Centralization’s single point of failure calls for a shift in how to operate tech infrastructures — a shift to decentralized data storage. Unlike centralized systems, blockchain networks distribute data across a large multitude of nodes that are in constant verification of one another through cryptographic consensus. To verify the data, the majority of nodes must be in agreement, a majority that rejects tampered “blocks” or compromised nodes. This means that there is no single repository that can be compromised, as attackers would need to compromise the majority of the nodes, a task immensely more challenging than the common compromise of a centralized server.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    Use the physical to verify the virtual

    The beauty of blockchain technology is its ownership element. As everything is secured by cryptography, the only way to “decrypt” the data and access it is through your own private keys. However, if a threat actor is to gain access to your private keys, they also gain access to your data and funds, posing a threat that puts in question how secure the shift from centralized to decentralized storage really is.

    If a private key is proof of one’s identity, then its loss equates to the loss of one’s digital identity, a compromise that can only be secured by undeniable proof that the owner of the keys is indeed who they claim to be. This is where biometric authentication becomes the final piece in the puzzle of securing one’s digital identity in a decentralized infrastructure.

    Using one’s fingerprint in an offline environment for identity verification not only ensures ownership of data and its security but also prevents the exposure of biometric data to a server where it could be breached. This creates a new paradigm that deems passwords and two-factor authentication obsolete. Building on such a methodology opens pathways for a secure digital identity and KYC verification on a decentralized infrastructure, leaving no room for threat actors to compromise digital identities.

    The conversation on digital security is the result of an absolute necessity in the face of increasingly sophisticated cyber attacks. However, adding uppercase letters, symbols and numbers to your password will not be enough. The added layer of two-factor authentication will not be enough either. More steps do not equate to more security. The future of security lies in an infrastructure shift from the centralized to the decentralized, protected by a layer of biometric authentication that ensures that one’s digital identity is secured.

    Our lives have migrated to a virtual world to the point where our emails have become an entry point to our identity. Medical records, employment history, education, world views and all that comes to mind, which pertains to who we are as people, likely have some form of digital footprint that can be traced back to us. While this can translate to seamless convenience, whether personalized recommendations or quick product deliveries, there remains a risk of exposure that threat actors constantly exploit.

    The tech titans who handle our data and boast a robust security infrastructure are the same ones who lost control of our data. With 16 billion Apple, Facebook, Google and other passwords leaked, a large question mark looms over the reliability of traditional security systems. The centralized databases and login processes of yesteryear are simply unable to keep up with today’s increasingly sophisticated cyber threats. Our passwords and two-factor authentication fall short in securing our digital identities.

    Related: Why Businesses Should Implement Passwordless Authentication Right Now

    The rest of this article is locked.

    Join Entrepreneur+ today for access.

    [ad_2]

    Venket Naga

    Source link

  • Protect Your Business Data Without Sacrificing Privacy With Koofr Cloud Storage on Sale | Entrepreneur

    Protect Your Business Data Without Sacrificing Privacy With Koofr Cloud Storage on Sale | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    If your business relies on secure data storage but you’re tired of monthly subscriptions eating into your budget, Koofr Cloud Storage can be the solution. With a one-time payment, you gain lifetime access to 1TB of cloud storage — enough to handle your most critical business documents, presentations, and media files without the need for recurring fees.

    Say goodbye to constant subscription costs and hello to a storage solution that fits your long-term business needs with lifetime access for $119.97 using promo code KOOFR40. This deal is only discounted through October 27 — so if you’re ready to purchase now, head straight to checkout.

    Koofr doesn’t track user activity, giving your business the privacy it deserves, the company says. In a world where data security is non-negotiable, Koofr ensures your sensitive information remains confidential while still providing the tools you need to get work done.

    1TB of storage can hold up to about 250,000 photos, 500 hours of HD video, or millions of documents. This gives you more than enough space to store client contracts, business presentations, and video assets — all organized in a single, secure location. Plus, Koofr’s advanced file management tools help you streamline your data. With a built-in duplicate finder, you can easily clear out redundant files and keep your storage efficient and clutter-free.

    Koofr also makes it easy to integrate existing cloud accounts like Dropbox, Google Drive, and OneDrive, allowing you to centralize your business data in one place for faster access and smoother operations.

    If your business needs reliable storage, enhanced privacy, and a one-time payment solution, Koofr is designed to simplify your workflow while keeping your data secure.

    Hurry and go right to checkout to take advantage of this deal ending on October 27 at 11:59 p.m. Pacific for 1TB of Koofr Cloud Storage available for $119.97 with coupon code KOOFR40.

    StackSocial prices subject to change.

    [ad_2]

    StackCommerce

    Source link

  • Train Your Company to Avoid Costly Data Breaches With This $30 Bundle | Entrepreneur

    Train Your Company to Avoid Costly Data Breaches With This $30 Bundle | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Data breaches can be devastating for businesses, costing an average of $3.92 million per incident, according to a recent Security Intelligence report. As a business owner, safeguarding your company from such risks is crucial, especially as cyber threats become more sophisticated and prevalent.

    Understanding the fundamentals of security and risk management is no longer optional; it’s essential. The CISSP Security & Risk Management Training Bundle offers comprehensive training designed to arm you and your team with the skills needed to effectively navigate these challenges. This comprehensive risk management training bundle is available for $29.97 (reg. $424) but only during this limited-time sale.

    Essential IT training for your team

    This training bundle includes eight courses covering vital domains in Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security and more.

    The first course in the bundle focuses on Security and Risk Management, which lays the groundwork for all subsequent domains. It covers key topics such as security governance, compliance, risk management concepts, and the development of security policies.

    Asset Security delves into managing and protecting critical organizational assets. This includes understanding data ownership, data classification, and implementing appropriate data security controls.

    Security Engineering is where you’ll get to study the engineering lifecycle and the various security components necessary to protect data structures and physical facilities. You’ll explore vulnerabilities in security architectures and the essential role of cryptography in information security.

    These three are just the introductory courses. Dedicated professionals can tackle all eight courses and apply what you’ve learned to your own security infrastructure.

    The bundle goes beyond theory, diving into the practical aspects of security engineering. Courses within this area teach how to identify and mitigate vulnerabilities, apply cryptographic tools, and build secure facilities and systems. These lessons empower businesses to engineer robust defenses that are both scalable and adaptable to future threats.

    Train your own cybersecurity team

    Invest in your company’s cybersecurity.

    October 27 at 11:59 p.m. PT is the deadline to get the CISSP Security and Risk Management Training Bundle on sale for $29.97.

    StackSocial prices subject to change.

    [ad_2]

    StackCommerce

    Source link

  • Citi reduces costs, invests in tech

    Citi reduces costs, invests in tech

    [ad_1]

    Citi posted cost reductions in the third quarter as it benefits from ongoing simplification efforts.   The $1.7 trillion bank’s total operating expenses clocked in at $13.3 billion, down 2% year over year, according to the bank’s Q3 2024 earnings supplement. The bank’s technology spend, however, increased 1% YoY to $2.3 billion.  The savings were driven […]

    [ad_2]

    Courtney Blackann

    Source link

  • Stay Protected on Public Wi-Fi with a VPN Travel Router for Just $159 | Entrepreneur

    Stay Protected on Public Wi-Fi with a VPN Travel Router for Just $159 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Maintaining a secure and reliable internet connection is essential for anyone with a digital presence. This becomes even more critical if you travel for work and rely on public Wi-Fi, which can be a breeding ground for unsavory characters. Unfortunately, many entrepreneurs travel often and find themselves at the mercy of this type of connection.

    While there are tips you can follow to use public networks safely, a tool like this Deeper Connect Air Portable VPN Travel Router ensures you’re staying as safe as possible online, no matter where you are. It’s on sale for just $159 (reg. $219) with the code CONNECT, plus it ships for free.

    Privacy and security.

    Using public Wi-Fi can expose your data to various security risks. This portable VPN router provides military-grade encryption, ensuring your internet activity remains private and secure, no matter where your business takes you. It’s also decentralized, which means none of your data is stored.

    This device also provides ad-blocking and parental controls, giving you complete control over your online experience. With the Deeper Connect Air, you can browse, work, and communicate with the confidence that your sensitive business data is protected. It’s also decentralized, which means none of your data is stored.

    Global access, speed, and portability.

    One of the more valuable features of the Deeper Connect Air is its ability to bypass geo-restrictions. This means you can access streaming services, websites, and content worldwide, regardless of location.

    The Deeper Connect Air has 80,000+ nodes around the world and delivers a mighty 300 Mbps connection, allowing you to stream, browse, and work without frustrating slowdowns.
    In addition, its compact and lightweight design makes it easy to pack and carry, so you can take it with you wherever your work takes you. Keep it right in your bag with your laptop so you’re never without it.

    The ultimate travel tool.

    Whether flying off to a different country or working in a cafe down the road, this travel VPN router is a fantastic way to ensure you’re connected and secure.

    Don’t miss this Deeper Connect Air Portable VPN Travel Router for just $159 (reg. $219) with the code CONNECT through September 3, plus free shipping.

    StackSocial prices subject to change.

    [ad_2]

    StackCommerce

    Source link

  • Salem State gets $624K grant for cybersecurity training center

    Salem State gets $624K grant for cybersecurity training center

    [ad_1]

    SALEM — Salem State University announced this week that it received a $624,437 grant to establish and operate a cybersecurity training facility on campus.

    The grant is part of the state’s Security Operations Center (SOC) Cyber Range Initiative, a program managed by Mass Tech’s MassCyberCenter that aims to help build a diverse generation of cybersecurity professionals through education, training and workforce development, according to a news release.

    “Massachusetts is committed to leading in cybersecurity and ensuring that all communities have the skills, resources and capacity to protect their businesses and residents,” Gov. Maura Healey said. “Congratulations to Salem State on this award and their efforts to grow the cyber workforce.”

    Lt. Gov. Kim Driscoll said how proud she is, “as Salem’s former mayor and a Salem State graduate … of the work the university is doing to teach students critical cybersecurity skills.

    “Cybersecurity affects every part of our community whether you are a small business, elementary school or local government office. The more cybersecurity professionals we have, the more we can ensure our communities are protected online,” Driscoll said.

    “Salem State is grateful to the Healey-Driscoll Administration and the MassCyberCenter for selecting us for this important partnership,” Salem State President John Keenan said. “This type of investment and professional relationships are a win-win for everyone involved.

    “Like our nursing and occupational therapy simulation labs, the CyberRange will imitate real-world problems for students to solve in real time,” he said.

    The funding is expected “to promote cybersecurity while also ensuring Massachusetts stays competitive in modern economic development,” said Yvonne Hao, state secretary of economic development and board chair of the Massachusetts Technology Collaborative.

    Salem State will join Bridgewater State University, Springfield Technical Community College and MassBay Community College as a critical part of a statewide network of cybersecurity educators, MassCyberCenter Director John Petrozzelli said.

    The award will support capital expenditures to construct the CyberRange and expenditures for the first year of operations.

    The center is expected to promote the Massachusetts cybersecurity ecosystem by working to build a strong cyber talent pipeline and to strengthen the defense of local communities.

    More information is available online at https://masscybercenter.org.

    [ad_2]

    By Buck Anderson | Staff Writer

    Source link

  • This Polar Wolf External SSD Drive Is on Sale for $44 | Entrepreneur

    This Polar Wolf External SSD Drive Is on Sale for $44 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Most modern businesses have data that’s worth backing up. For those collaborating with partners and agencies, sometimes shuttling some assets over to another building is done most safely and securely with a portable drive. For those looking for an affordable and reliable option, this Polar Wolf Aluminum Ultra Portable External SSD is on sale for only $43.99 (reg. $75) for a limited time.

    The Polar Wolf is designed to be easy to plug and play with any standard computer, any USB-A and USB-C device, iPad Pros, Macbooks, USB-C laptops, and more. The drive’s sleek, compact design makes traveling with it a breeze. When it comes time to make a transfer, fast speeds of up to 520MB/s make the Polar Wolf an ultra-attractive external drive option for modern businesses and entrepreneurs.

    You don’t want to have a project fall behind its deadline because a data transfer is taking longer than it should. When you head across the country or abroad for a business trip, having a copy of the presentation you’re bringing that can fit in your pocket can make a world of difference in terms of security and reliability. This Polar Wolf portable drive can help with all of the above.

    This limited-time deal includes the 256GB external SSD drive, as well as instructions and a cable that’s designed to support its high-speed transfer capabilities. Don’t miss this exceptional deal that can streamline your business.

    This Polar Wolf Aluminum Ultra Portable External SSD is on sale for just $43.99 (reg. $75) for a limited time.

    StackSocial prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Why You Should Stop Obsessing Over Your Goals to Achieve Them | Entrepreneur

    Why You Should Stop Obsessing Over Your Goals to Achieve Them | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    America harbors a uniquely goal-oriented culture. From our homes to our offices, from our bodies to our minds — a large majority of us are in a never-ending pursuit of measurable results in every aspect of our lives.

    Our wristwatches count daily steps, water bottles grade water intake by volume, and weight scales connect to our iPhones to input calories eaten. Dating is a “numbers game.” Even babies have sleep monitors that output slumber scores. Simply put: Key Performance Indicators (KPIs) occupy an outsized portion of our headspace.

    Nowhere is this phenomenon more present than in a business setting. Corporate offices are filled with executives rushing to read the latest dashboard; social media managers eagerly tally every video view; performance marketers monitor every click. I feel this daily as both a new mom and the owner of a market research company. The last seven months with my daughter have had me losing sleep — and not for the reason that you think. She’s sleeping great! But I’m staying up obsessively tracking her milestones; did she roll over adequately? Has she “cooed” the right number of times today? We use data to help us feel “in control,” but ultimately, the data controls us.

    My industry is guilty of the same crime. Data dashboards offer an illusion of control. Executives stare at statistics inside the boardroom while the real world runs rampant outside the door. I’ve seen it many times: a brand tracker reports a seemingly healthy brand, and suddenly, the business falls off a cliff. Culture shifts, consumer preferences change, and despite volumes of data, business leaders are blindsided.

    We lose out on the grand vista of value by obsessing over a goal, the golden data point at the end of the rainbow. It’s never about one number or one data point. The greatest value and the most interesting lessons come from what we’ll call data wandering: exploring multiple data points, connecting dots and inviting in the necessary complexity vital to revelatory truths. Here are some perspectives that guide how you wander the data landscape – and relinquish single-digit-chasing.

    Related: Why Focusing on KPIs Too Much Can Backfire

    Data is the compass, not the captain

    There’s a reason that KPIs are “Key Performance Indicators” instead of “Key Performance Answers.” This is your reminder that data very rarely has the solution to your question. Data is a barometer, a clue — a critical piece that completes the puzzle. When you shift your perspective and allow data to guide rather than lead, you will become freer to think critically and creatively. As a market researcher, I’m asking you to consider your data an ellipsis versus a full-stop period. In your day to day, practice this mantra by inserting the statement, “That’s interesting, I wonder if…” after every data point you encounter – in work and life.

    Data is a slice, not the pie

    In industry and society, we’ve gotten really good at housing, analyzing and gleaning insight from big data. Still, it can feel like we are drowning in information — information that can be reliable and contradictory at the same time. This is because there will always be more data and a different way to ask the same questions or analyze the same data. And no matter how much data you’ve succeeded at aggregating, you’re often looking at a sliver of reality. If there is a world of truth outside of a metaphorical house, you are looking through a tiny crack in the wall and what you see will always be a partial view. And that’s ok, for now. As our industry stands, there is no pie (cue the Matrix: there is no spoon!). When you realize that all data is a glimpse, it makes wandering that much more fun.

    Related: How to Determine Your KPIs and Achieve Profitability

    Data is strong in its flexibility, not its rigidity.

    In life and in business, novelty and change are the norm, not the exception. When we become too rigid in “how we do things” and the data sets we monitor and track, we lose sight of the world around us. Tunnel vision is the antithesis of exploration, and it’s often the leading cause of a business’s failure to innovate. Kodak was hyper-focused on the success of film photography and didn’t see the digital revolution. Xerox was celebrating healthy sales data around copy machines and chose to stifle innovation in favor of their hero product. Blockbuster overvalued the strength of its brand equity measures, failing to see the rise of the little-known company named Netflix.

    Goal orientation gives us purpose and meaning – but goal obsession makes us psychologically immobile and incapable of seeing the full picture. Consider how 2024 can be your year to embrace feeling out of control – welcoming the idea that despite all the data in the world, you may still not know “for sure.” This will open you to more innovation, evolution, and changes, big and small.

    [ad_2]

    Maria Vorovich

    Source link

  • This Data Recovery Software Keeps Your Business Safe, and Now It's $45.97 for Life | Entrepreneur

    This Data Recovery Software Keeps Your Business Safe, and Now It's $45.97 for Life | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    According to TrueList, 94% of companies that face a major data loss don’t end up recovering. And while you may not think about data loss on a daily basis as an entrepreneur, it’s something to seriously consider. Fortunately, there are now tools ready to help in the event it happens, like EaseUS Data Recovery Wizard.

    Recover lost data easily and efficiently anytime with a lifetime subscription to EaseUS Data Recovery Wizard. Though it usually sets you back $149, you can currently score it for just $45.97 — no coupon code required — right here through January 21.

    Cover your bases in the event of a data loss with help from EaseUS Data Recovery Wizard. This powerful software is ready to recover your precious info after any type of data loss scenario, working to retrieve deleted, formatted, or lost files from PCs, laptops, hard drives, SSDs, USB Drives, and more. The software has an impressive 99.7% success rate, so you sleep easy knowing you’re in good hands.

    There are an impressive 2,000 recoverable device types and 1,000 file types supported. And with its user-friendly interface and quick scanning process, EaseUS Data Recovery Wizard is straightforward to use. There are only three steps to take — you scan for lost data in the location where you lost files, preview the lost data filtered by path or type, and then sit back and recover your lost data by selecting the files you want to recover.

    Safeguard your business with a lifetime subscription to EaseUS Data Recovery Wizard, now just $45.97 (reg. $149) with no coupon code required now through January 21 at 11:59 p.m. PT.

    StackSocial prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • 7 Next-Gen Security Recommendations to Safeguard Your Data | Entrepreneur

    7 Next-Gen Security Recommendations to Safeguard Your Data | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    The threat landscape is growing, and professional cybercriminals are increasingly becoming more dangerous as their methods develop in complexity and sophistication.

    Although threat actors leverage different techniques, they all have a common goal: to find a single exploitable security weakness and rapidly take advantage of the situation. Developing a tactical response plan is essential; however, the best defense is strengthening security to prevent attacks from occurring in the first place.

    Most of us are familiar with common security recommendations: 2FA, software updates, data encryption, using secure networks, VPNs, proxy servers and more. While these recommendations should always remain part of your security toolkit, others have emerged to help you adapt to the rapidly evolving threat landscape.

    Related: Data Security: How To Protect Your Most Sensitive Asset

    1. Avoid inputting sensitive information into generative AI applications

    Generative AI leverages machine learning and deep learning algorithms to autonomously generate content based on complex data patterns. These systems are trained on datasets containing text from the internet, books, articles and other public sources; however, they can also “learn” from user interactions by collecting data from conversations.

    Recently, enterprise-grade versions of ChatGPT and GitHub Copilot have been introduced, claiming that these models do not use business and conversation data for training purposes. To safeguard sensitive data, at Oxylabs, we actively encourage our employees to use business accounts.

    Nevertheless, it is less clear how popular generative AI tools use customer data if customers interact with free versions. Therefore, users should still exercise caution by avoiding the input of sensitive or confidential company data into generative AI applications if free accounts are being used. Further, data should be completely anonymized and stripped of personally identifiable information to maintain privacy and security.

    2. Go beyond standard security protocols for remote teams with encrypted, containerized workspaces

    Hybrid teams went mainstream in 2020 and are likely here to stay. While working remotely benefits both employers and employees in many ways, the use of mobile teams continues to challenge organizations from a security perspective.

    We’re all familiar with conventional protocols such as using trusted Wi-Fi networks, VPNs, Multi-Factor Authentication (MFA) and data encryption. Due to the increasing use of cloud-based services, companies must also ensure each vendor has robust security practices in place and maintains compliance with the latest security regulations.

    Another emerging recommendation is deploying encrypted, containerized workspaces on company-owned and personal employee devices. The use of such systems ensures data is secured in a container even if device safety is compromised. For example, if malware infects a containerized browser, it won’t be able to spread anywhere beyond it.

    3. Secure supply chains with a risk-mitigation strategy

    Supply chains are growing in size and complexity, requiring a comprehensive risk management strategy that includes compliance with regulations and robust safety protocols.

    Risks include phishing attacks, ransomware, software vulnerabilities, man-in-the-middle attacks and more. It is recommended to implement standard security measures such as firewalls, intrusion detection systems and advanced security monitoring. Further, it’s essential to integrate specialized security standards and practices, such as the Cybersecurity Framework developed by the U.S. Institute of Standards and Technology (NIST).

    Related: How to Mitigate Cybersecurity Risks Associated With Supply Chain Partners and Vendors

    4. Swap traditional encryption methods with quantum-resistant encryption algorithms

    Quantum computers beat traditional computers by leveraging quantum mechanics to solve complex problems faster; however, their use poses a challenge to commonly used encryption methods.

    Encryption typically converts plaintext (unencrypted data) into ciphertext (encrypted data) using a cryptographic algorithm that requires a key to “unlock” the data. Quantum computing potentially weakens or breaks commonly used encryption techniques, such as Grover’s algorithm, Shor’s algorithm and quantum key distribution.

    To address the threat, researchers are exploring post-quantum cryptographic techniques and algorithms designed to withstand attacks from quantum computers. These include code-based cryptography, hash-based cryptography, lattice-based cryptography and more. In the meantime, organizations must maintain a robust security posture and stay informed of quantum-resistant encryption methods as they become available.

    5. Safeguard Cyber-Physical Systems (CPS)

    Cyber-Physical Systems (CPS) communicate with the world around us through a network of computational and physical components. These include electrical power distribution systems or smart grids, smart traffic management systems, autonomous vehicles, remote healthcare monitoring, smart buildings and more.

    The concept has been around for decades; however, the emergence of Internet of Things (IoT) devices, connected appliances and sensor technology has increased CPS prevalence substantially since 2010. Data generation has grown concurrently, attracting cybercriminals in the process.

    Access control, authentication, software updates, monitoring and regulatory compliance are well-known protocols to secure CPS. Emerging recommendations also include:

    • Network segmentation to isolate critical CPS components and less crucial systems to limit access in the event of an attack;

    • Designing CPS systems with redundancy and fail-safe mechanisms to ensure systems keep operating if an attack or system failure takes place;

    • Regular penetration testing or simulated cyber attacks to identify vulnerabilities.

    6. Boost your Identity and Access Management (IAM) strategy with three-factor authentication (3FA) and passkeys

    We’re all familiar with two-factor authentication (2FA), where two steps or “factors” are required to access a system, including a password or PIN and a mobile phone or device that generates a one-time password (OTP).

    3FA takes security up a level by requiring authentication comprised of some type of biometric data, such as a fingerprint, face scan, iris recognition, vein recognition, voice recognition or other piece of highly individual data. However, even 3FA might soon be overthrown by passkeys, a technology already used by Google. Resistant to phishing, passkeys utilize fingerprints, face scans or pins to unlock a device or program without using passwords.

    Related: Cybersecurity for Small and Medium-Sized Businesses — How to Conduct a Comprehensive Risk Assessment

    7. Protect assets with cyber insurance

    Last but not least is cyber insurance. It’s not the most innovative or exciting recommendation on this list, but insurance has existed for hundreds of years because it adds value to any security strategy.

    Cyber insurance can protect your organization from liabilities associated with sensitive data breaches, such as credit/debit card details, health records and social security information. While it may be cost-intensive in some cases, it does have the potential to save your organization millions of dollars in the event of a security breach.

    Cybercriminals continuously enhance their techniques. That’s why it’s imperative to stay a step ahead with a robust data security strategy that fuses next-generation practices that go beyond familiar safety protocols. Integrating these recommendations protects your organization’s digital assets on the ever-evolving threat landscape to ensure long-term business viability and success.

    [ad_2]

    Julius Černiauskas

    Source link

  • Data Breaches Cost $1 Million More When Remote Work Is Involved — Here Are 4 Steps to Protect Your Business. | Entrepreneur

    Data Breaches Cost $1 Million More When Remote Work Is Involved — Here Are 4 Steps to Protect Your Business. | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Remote work is a double-edged sword: It provides your employees with the comforts of staying at home, but it also creates additional security risks as they are more likely to use unprotected devices and connect to unsecured public networks.

    At least 20% of businesses went through a data breach caused by remote workers. As reported by IBM, the average data breach cost is $1 million higher in companies where remote work is common. It also takes 58 days longer for such organizations to discover and contain data breaches.

    Related: Entrepreneurs Beware: Remote Work Can be Fertile Ground for Cybercriminals

    Step 1: Categorize your company’s data

    Your business holds vast data, from client credit card details to employee IDs. For effective security, categorize your information. We classify ours into three: critical, restricted and confidential data.

    Critical data is what, if leaked, would seriously damage the company’s reputation, making a return to normal operations almost impossible. It includes user credentials, card security codes, client order history and customer behavior data. I would also add source code for software companies.

    Restricted data, if leaked, could seriously threaten our business. It would undermine the company’s reputation, but it’d be possible to continue operating in a limited way. Such data contains emails, locations, device info, app usage insights and many other kinds of data from our customers.

    The last category, confidential data, includes the organization’s trade secrets. Such leaks would harm the company’s operations but would have a smaller impact on its reputation. It comprises the team members’ data, company policies and procedures, recruitment process details, source code, financial statements and more.

    Step 2: Calculate the cost of a breach and create policies

    We all hate bureaucracy— I know that. Yet for a business to work, its members must follow certain rules (i.e. policies). To create a good cybersecurity policy for remote workers, you need accurate data. I recommend calculating the cost of potential data breaches using real money.

    Be sure to take into account all types of losses. A company’s data breach results in direct expenses like investigation and compensation, indirect costs from recovery efforts and lost revenue and opportunity costs due to reputational damage and lost potential business.

    After calculating the costs of a data breach, design policies. Standard procedures usually include policies on how you label and share data, what security controls you must have and what training your workers must attend.

    Related: How Do You Manage Cybersecurity With Employees Across the Globe? Here’s Your Answer.

    Step 3: Reduce the risks of remote work

    First, ensure the security of your computers. Make it so your remote workers access corporate resources from corporate devices only. Have your helpdesk specialists configure all devices according to your information security standards. They’ll need special administration tools for the task like JAMF.

    Second, monitor the state of your corporate devices. Handle the installation of patches, security updates and the latest versions of OS and software. Use special monitoring tools like JAMF and encourage employees to keep their working stations up-to-date. Last, install an Endpoint Detection and Response (EDR) or Antivirus (AV) agent to track malicious activities on your corporate computers. An example of such a system would be CrowdStrike.

    Third, control the access to corporate resources. Remote workers should only have access to resources necessary for their work. Make it so they can interact with them only with the corporate VPN turned on. I recommend also enabling IPS or IDS on the VPN to look out for network anomalies.

    Don’t forget about multi-factor authentication. It’ll add one more layer of security to your company’s data and decrease the chance of unauthorized access, and you can use ready-made MFA solutions.

    Step 4: Encourage your remote workers to be responsible

    Truth bomb: The actions above aren’t enough to protect your business from security risks. About 60% of attacks succeed because average employees make mistakes. It’s your duty to help your employees understand the importance of cybersecurity.

    First, encourage them to use special apps that track whether their device is safe. They can be in the form of a security checklist, which dynamically checks various system indexes and is easy to understand.

    Second, motivate workers to keep the corporate VPN turned on. You can also make their lives a lot easier by making the VPN connect automatically when the system starts up. If you don’t have a business VPN, use a regular one from a trusted provider.

    Last, don’t forget about training. Encourage your workers to learn, but make it exciting. Monotonous video lectures won’t do — add gamification and interactivity. Your company’s security rests with your team; build a strong human firewall by instilling best practices and fostering vigilant behaviors.

    Related: How Safe Is Your Data While Working Remotely?

    Bonus step: What to do with your freelancers

    The problem with freelancers is that you can neither make them work on your corporate laptops nor install special security software on their devices. You can, however, manage their access to your company’s resources.

    Limit their access to essential company resources, using the least privilege principle. If feasible, avoid access altogether and establish secure data-sharing protocols. Always clarify collaboration terms in contracts and NDAs detailing data access and usage. Emphasize that violations may lead to legal consequences.

    Safeguarding your company in a remote work era is entirely achievable. Begin by discerning the types of data you possess and understanding the potential costs of breaches, tailoring security measures in response. Prioritize the integrity of your corporate devices and manage access to resources. Talk to your remote workers and implement the use of robust security tools like VPNs.

    [ad_2]

    Mykola Srebniuk

    Source link

  • Don’t Overlook This Critical Element in Your Cybersecurity Strategy | Entrepreneur

    Don’t Overlook This Critical Element in Your Cybersecurity Strategy | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    The SaaS model has revolutionized the way businesses operate and engage with software. By allowing businesses to access software applications over the internet on a pay-as-you-go basis, it eliminates the need for complex physical infrastructure and extensive maintenance. Additionally, it offers startups the agility to scale swiftly and leverage a recurring revenue model.

    However, this increasing reliance on cloud-based services implies an expanded attack surface, the points where potential cybersecurity threats can penetrate the system. In the SaaS realm, providers are custodians of their customer’s data. Therefore, data breaches could significantly tarnish their reputation, lead to financial losses and even invite legal liabilities.

    Related: This Is Why We Need To Focus More on Cybersecurity Strategy

    Attack surface management: Unveiling the concept

    In cybersecurity parlance, the attack surface refers to all the potential points where unauthorized users might infiltrate the systems or data. These points could be hardware, software, networks or even users. As SaaS startups grow, so does their attack surface, making it a complex task to secure their landscape.

    ASM involves the continuous practice of mapping, monitoring and managing this surface to neutralize potential security threats. This encompasses identifying vulnerabilities, reducing unnecessary access privileges and conducting perpetual surveillance for new potential risks.

    Why SaaS startups must implement an ASM strategy

    For SaaS startups, implementing a robust ASM strategy is critical. Here are the reasons, along with some technical considerations:

    Reducing vulnerabilities:

    By accurately identifying their attack surface, startups can discover system vulnerabilities before cyber criminals exploit them. These vulnerabilities can be:

    • Software vulnerabilities: Bugs or errors in the code, outdated software and unpatched systems can serve as a gateway for attackers.

    • Network vulnerabilities: Weak or poorly configured network security measures can provide opportunities for attacks.

    • Human vulnerabilities: Employees can unwittingly create security holes by falling for phishing scams, using weak passwords or failing to follow best practices.

    ASM helps startups proactively address these vulnerabilities, using tools such as vulnerability scanners and automated patch management systems.

    Regulatory compliance:

    As data privacy and security draw global attention, industries are burdened with rigorous regulatory obligations. Non-compliance can lead to severe penalties and legal ramifications. ASM helps startups meet regulations such as GDPR, CCPA and HIPAA by ensuring they have a clear understanding of their data flows, access controls and security vulnerabilities.

    Protecting brand reputation:

    In the era of digital commerce, customers’ trust in a brand is often tied to their confidence in its ability to secure their data. A single data breach can severely damage a startup’s reputation, making it difficult to retain customers and attract new ones. ASM plays a crucial role in building and maintaining this trust by demonstrating a proactive approach to security.

    Avoiding financial loss:

    Cybersecurity breaches often result in significant financial losses, from system downtime and loss of business to legal fees and regulatory penalties. Startups, particularly in the early stages, might not have the financial resilience to withstand such losses. Implementing an effective ASM strategy can help prevent these damaging events.

    Fostering customer confidence:

    A strong security posture isn’t just about avoiding negative outcomes; it can also serve as a key differentiator in a competitive market. When startups can clearly communicate their commitment to data protection and demonstrate robust ASM practices, they build trust and confidence among their customer base, leading to improved retention and acquisition.

    Related: Why Is Cybersecurity Important for Your Business? Neglecting It Could Be Your Downfall.

    The how-to of implementing effective ASM

    Given its criticality, how can SaaS startups implement effective ASM? Here are a few strategies, each with its technical facets:

    Comprehensive visibility:

    Comprehensive visibility is fundamental to effective ASM. SaaS startups need to maintain a clear and detailed understanding of their digital ecosystem. This entails the identification and documentation of every piece of hardware, every software application, all network components and data.

    Asset discovery:

    The first step is to perform asset discovery, which can be a daunting task given the vast and interconnected digital assets in a SaaS setup. An asset discovery tool is typically used to automate this process. These tools scan IP addresses across the network, identifying and cataloging every device and system in their path.

    Asset discovery tools not only detect assets but also gather metadata about them, including the operating system, installed software, open ports and more. This data is invaluable when it comes to managing and reducing the attack surface.

    Cloud assets and shadow IT:

    For SaaS startups, it’s important to extend visibility to cloud assets. Traditional asset discovery tools may not cover cloud-based assets like virtual machines, databases or containers. Using cloud-native tools or third-party solutions that can discover and monitor cloud assets is essential.

    Startups should also watch out for shadow IT, which refers to software, devices or services used without explicit IT department approval. These can significantly expand the attack surface, often without the knowledge of IT or security teams. Solutions for shadow IT discovery and control are available and should be a part of the visibility strategy.

    Regular assessments:

    Regular vulnerability assessments can preempt potential threats before they materialize. Startups can use automated vulnerability scanning tools, which will systematically check their systems for known vulnerabilities and penetration testing, a more aggressive approach that simulates the tactics of real-world attackers. With the digital landscape in constant flux, regular assessments form a critical part of ASM. These assessments should focus on identifying vulnerabilities that could potentially be exploited by attackers.

    Vulnerability scanning:

    Vulnerability scanning is an automated process that checks systems for known vulnerabilities. These tools utilize databases like Common Vulnerabilities and Exposures (CVE) to identify software weaknesses. For comprehensive protection, startups should ensure their vulnerability scanning tools cover their entire environment — including cloud and mobile assets.

    Automation:

    With the complexity of modern digital environments, automation is vital for effective ASM. Automated scanning should be supplemented with manual code reviews, especially for the startup’s proprietary software. Manual reviews can often catch logical errors or other issues that automated tools might miss.

    Penetration testing:

    Penetration testing takes vulnerability assessment a step further. Rather than just identifying potential vulnerabilities, it actively attempts to exploit them to evaluate the system’s defense capability. This form of testing mimics real-world attacks and can help startups understand how an attacker could potentially breach their defenses. While regular penetration tests are essential, they should be performed by certified ethical hackers or reputable third-party security firms to ensure the process doesn’t inadvertently cause harm.

    In a nutshell, with escalating cyber threats, attack surface management has become a critical element of the cybersecurity strategy for SaaS startups. By proactively identifying, managing and minimizing their attack surface, startups can safeguard their customers, reputation and bottom line while fostering a resilient cybersecurity culture. This proactive approach will stand them in good stead as they navigate the dynamic and often challenging landscape of the SaaS industry.

    Related: Cybersecurity for Small and Medium-Sized Businesses — How to Conduct a Comprehensive Risk Assessment

    [ad_2]

    Jim Koohyar Biniyaz

    Source link

  • Citizens Bank all in on Cloud by 2025 | Bank Automation News

    Citizens Bank all in on Cloud by 2025 | Bank Automation News

    [ad_1]

    Citizens Bank plans to take its banking operations to the cloud by 2025.   “We are going to exit all of our data centers that we own today,” Chief Information Officer Michael Ruttledge said Tuesday at Fintech Connect North America in New York. “We started with seven (data centers) and now we are down to five […]

    [ad_2]

    Vaidik Trivedi

    Source link

  • Here’s How to Claim Your Piece of Google’s $23M Settlement | Entrepreneur

    Here’s How to Claim Your Piece of Google’s $23M Settlement | Entrepreneur

    [ad_1]

    Google is paying $23 million to settle a class-action lawsuit that claims it violated user privacy by sharing data with third parties.

    [ad_2]

    Madeline Garfinkle

    Source link

  • How to Harness Data for the Underserved Market | Entrepreneur

    How to Harness Data for the Underserved Market | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Simply knowing who’s included in our most underserved populations can be a challenge that makes public sector outreach nearly impossible. To overcome these obstacles and better serve consumers, we must first identify the underserved and their needs. Public agencies can use two powerful tools to help reach the most vulnerable: credit and alternative data.

    Defining underserved populations

    The first thing agencies must do is understand what an underserved population is. The Department of Health and Human Services (HHS) has a good definition specific to healthcare: individuals who have experienced healthcare disparities. Healthcare disparities can manifest due to a lack of available services, difficulty accessing care and limited knowledge about navigating the healthcare system or finding providers. Agencies looking to define underserved populations can adapt this definition to their specific fields.

    The Federal Reserve also has a good working definition: people who don’t have access to a bank. This lens is handy because a lack of access to essential banking functions is a significant barrier to receiving other public services. Without a bank account, options to cash checks are limited and often come with additional hurdles like stricter controls, timing requirements, increased fees and more. Those without a bank account also can’t receive direct-deposit benefits or savings interest rates that could help them get ahead. Identifying the unbanked or underbanked first is an excellent way to use data to find and reach more individuals likely underserved by public benefits.

    Research shows underserved populations regularly fit into specific demographic groups. These groups include the unemployed and elderly, veterans, disabled persons, those living below the poverty line and those residing in rural areas. Through a combination of factors, these groups are at the highest risk of needing government benefits while often participating in assistance programs at lower rates.

    Related: Leverage the Power of Data to Boost Your Sales — and Your Customer Connections

    Out-of-reach insights

    As it stands, government agencies could better understand who uses their services. A lack of comprehensive understanding is partly due to outdated privacy laws and red tape; until recently, government websites weren’t allowed to collect cookies on their visitors. Of course, there’s a fine line between privacy protection practices and using data to reach underserved populations better. Still, many government agencies can be more effective in using the data they have at their disposal. Crucial insights may remain out of reach for agencies that struggle to analyze the reams of data that can exist across systems.

    Public sector executives must meet this pervading problem with a viable solution. Veterans are one significantly underserved group — often because states don’t have access to a robust database covering their veteran populations. However, they’re only one of the groups often overlooked by public agencies. And while many agencies are getting better at using digital tools and data analytics, there’s still work to be done. Improving outreach is one way to close this gap, and we can do so through the judicious use of good data.

    Related: Using Data Analytics Will Transform Your Business. Here’s How.

    Data unlocks doors

    The private sector is good at leveraging data to identify and reach its customers. Most brands and companies know the demographic data of their typical consumers — and they’re experts at turning that knowledge into profits. Data can reveal where a company’s target market lives, how it responds to advertising and other key behaviors that better enable retailer outreach. Public sector agencies can operate in the same way.

    For example, take the bus system in Montgomery County, Maryland. The county’s Department of Transportation redesigned its bus system to introduce the Flash. That redesign happened because the agency looked at its proprietary data behind its typical user. Before the redesign, bus riders often had to make multiple transfers, adding inconvenience to their lives.

    The Montgomery County Department of Transportation (MCDOT) reviewed whom this problem impacted, the peak times it affected them, and how the city utilized the busing system. Then, it created new routes, resulting in significantly improved and efficient customer experiences. Innovations like these are precisely what other public sector agencies need to embrace to serve constituents more effectively.

    Related: Redefining Customer Engagement in a World Where Data Privacy Reigns

    Taking action

    Good data is essential to determine the best way to connect with consumers. But how exactly do busy public sector leaders begin implementing a more robust data analytics strategy? External data is readily available through many public sources. Companies like credit reporting agencies have access to a plethora of information on underserved populations. They can help pinpoint the most vulnerable audiences — who they are and what they need — to maximize the good a new outreach program can do.

    Internal usage data may also be key to determining the highest area of need. Public transit is an excellent example: Adding a bus route in an affluent suburb may not be as important as expanding or optimizing routes in a high-density metropolitan area because most suburban people have cars. Agencies will only discover information like this by leveraging data.

    Analytics are particularly valuable when they inform the best strategy to reach those in need. Not all methods work for all audiences; one group may be best reached via email, another may be more open to television ads, and yet another may be most receptive to telephonic outreach. Analytics can provide valuable insights that keep agencies from wasting resources on dead-ends or unnecessary services.

    Quality service begins with informed outreach

    Public services are intended to help the people who need them most. But to meet the mark, we must first know their needs. Improving the customer experience begins with a solid outreach strategy guided by both external and internal data and analytics.

    Modern tools can help us close the gap in need, enhancing the quality of life for the most vulnerable and elevating our society. Data is the engine powering the train toward that goal.

    [ad_2]

    Scott Straub

    Source link