Security breaches stories - Page 12
Highlights of the Verizon Data Breach Report 2016
Thu, 5th May 2016
#
security breaches
Verizon's 2016 report: Outsider threats dominate breaches, fast detection crucial, and mitigation key when patching’s not possible.
Aussie PC users patching software vulnerabilities, but big challenges still remain
Wed, 4th May 2016
#
security breaches
A recent study by Flexera Software had mixed results for Australia’s PC users - is the software on your PC safe?.
Are cybersecurity investments wasted money?
Mon, 18th Apr 2016
#
security breaches
No matter how much money we throw into cybersecurity, it seems to have little impact on reducing the damage of breaches and attacks.
Fortinet’s Advanced Threat Protection: Secure your sensitive data, ensure your privacy
Thu, 18th Feb 2016
#
security breaches
Securing your data and ensuring your privacy can be difficult tasks. Here is Fortinet’s five step solution to prevent the most persistent threats.
Wake up call: IoT security not up to scratch
Mon, 15th Feb 2016
#
security breaches
Alarming Strategy Analytics report finds IoT security lax as firms grapple with data breaches and rising cyber threats.
Salient Eye app catches Kapiti Coast thief
Wed, 1st Jul 2015
#
security breaches
Salient Eye, a free Android home security app, has helped a family in Wellington catch an intruder trying to break into their home.
Meet the encryption flaw that's putting internet users at risk
Fri, 22nd May 2015
#
security breaches
LogJam allows an attacker to weaken what is believed to be a secure encrypted connection between a user and a server, according to Trend Micro.
How to prevent data breaches
Wed, 6th May 2015
#
security breaches
Businesses are failing to protect themselves adequately from increasingly-sophisticated techniques used by cyber criminals, says Palo Alto Networks.
Express Data & Cisco - Mobility in today’s world
Thu, 9th Apr 2015
#
security breaches
A new approach to security has to be adopted. The firewall is still a major aspect of a security strategy, but is only part of the story.
Virtualisation provides single point of defence.
Thu, 1st Nov 2012
#
security breaches
Virtualisation renders a single point of defence but comes with unique security challenges, necessitating a robust focus on safeguarding the host system.
ISACA survey shows IT business problems
Wed, 8th Aug 2012
#
security breaches
ANZ tech leaders grapple with IT staffing shortages, security breaches, and strategic disconnects, a new ISACA survey reveals.
Employees cause security concerns
Thu, 16th Jun 2011
#
security breaches
New Zealand businesses are concerned about security breaches stemming from staff mistakes, a recent survey from Symantec shows.
ICT safety & security
Mon, 1st Nov 2010
#
security breaches
Businesses must implement robust cybersafety frameworks to avoid breaches, often caused by internal sources. Educating staff is essential.
The age of consequence
Fri, 1st Oct 2010
#
security breaches
IT administrators can greatly benefit from network-wide visibility into malware related incidents and policy breaches.
The App is King
Fri, 1st Oct 2010
#
security breaches
With the rise of cloud computing, traditional security measures falter, making secure application development essential—The app is now king.
Policies for productivity
Tue, 1st Sep 2009
#
security breaches
NetSafe launches 'The Whatsit?', a free online resource aiding SMEs in crafting ICT policies and promoting cybersafety, boosting productivity and security.
Buckle up for compliance
Wed, 1st Apr 2009
#
security breaches
As compliance demands grow, businesses must leverage IT to automate and streamline audit processes, reduce costs, and safeguard against penalties.
Infastructure planning checklist
Fri, 1st Sep 2006
#
security breaches
Before planning your next customer’s datacentre installation, GFI has put together a checklist including business problems to be considered.