December 19, 2016
The Identity Theft Resource Center recently reported that in 2015, over 169 million personal records became exposed through 781 security breaches. These breaches affected a wide range of businesses, including financial institutions, educational institutions, government agencies, and healthcare companies. Yet this number only includes breaches that were made public, which means […]
December 5, 2016
With the rise of the Internet of Things (IoT) has come greater conversation on security flaws and vulnerabilities. These vulnerabilities are often considered inherent, but this is largely due to the fact that the IoT is behind the curve on protection mechanisms, and manufacturers aren't focusing enough on improving their security. No business likes to have to clean up after a d[…]
Filed Under:
Data,
hardware,
monitoring,
security updates,
Security,
security,
IoT,
Internet of Things,
firmware
RECENT POSTS
- Top 5 Benefits of Conducting a Gap Analysis in Cyber Security
- 4 Ways Mobile Device Fleet Management Tools Streamline Modern Businesses
- How Outsourced Telecom Expense Management Can Help Your Business Grow
- 7 Benefits of AI in Cyber Security
- How Businesses Use AI To Improve Customer Experience
- 6 Reasons Why Businesses Should Consider the Cloud for Cyber Security
ARCHIVES
CATEGORIES