Sage data breach highlights need for least privilege access and two common errors businesses make, warns Hypersocket Software

The data breach at UK accounting software company Sage has brought the insider threat facing businesses into focus and, according to security experts Hypersocket Software, highlights the need for more stringent access control. The Sage breach, which may have compromised the personal information of employees at 280 businesses, is thought to have resulted from unauthorised […]

Read More…

Access all Areas?

Driven by a growing number of security breaches, the demand for greater mobility at work and the trend towards Bring Your Own Device (BYOD) in the workplace, Identity and Access Management (IAM) is a growing area of focus for businesses across many sectors. Just how intense that focus is set to become is illustrated in […]

Read More…

The BYOD explosion: How much of a threat do personal devices really pose to your network?

How much of a risk is BYOD to network security? No more than company-issued hardware – provided businesses follow these four essential steps says Lee Painter. We’re all familiar with BYOD dangers: data breaches exploited because of a lack of proper security protocols and encryption on devices or missed operating system updates; data leakage as […]

Read More…

Integration Point: Password Manager and Digital Transformation

Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]

Read More…

Six Steps to Avoid Becoming A Data Breach Statistic

US fast-food chain Wendy’s is the latest organisation to suffer a significant data breach. As the story unfolds, it’s clear the business seems to have been caught off guard in fully understanding the impact and extent of the breach. This isn’t at all unusual – the first time many businesses know they’ve been hacked is […]

Read More…