Service level agreements

Problem solve

  • Five steps for responding to hospital ransomware attacks

    Hospitals are prime targets for ransomware attacks. Health IT teams must move quickly to identify and isolate a ransomware infection to keep it from spreading.Continue Reading

  • Verizon: Human error still among the top data security threats

    Verizon's 2016 Data Breach Investigations Report found human vulnerabilities and errors continue to be among companies' top data security threats.Continue Reading

  • Cyberinsurance policies: Getting coverage and avoiding limitations

    The cyberinsurance market is maturing rapidly, but there are still gray areas to navigate. Sean Martin explains what enterprises should know about policies.Continue Reading

  • Enterprise mobile strategy: Step up security

    CISOs are tasked with developing an effective enterprise mobile strategy that offers different levels of mobile security, from device management to application-layer controls. Some companies are moving beyond device management and containerization to protect the data layer. An effective enterprise mobile strategy can increase employee productivity, but how can security programs strike a balance between user experience and information security? In this issue of Information Security, we talk to companies about their enterprise mobile strategies to find out what works and what doesn't.

    Even with all the momentum in advanced authentication, some enterprises show no signs of moving beyond usernames and passwords. Why isn't advanced authentication, such as one-time passwords or multifactor authentication (MFA), widely deployed? Despite the challenges of implementing and maintaining strong authentication methods, they provide significant benefits over password-only authentication mechanisms. The consumerization of MFA may lower costs. We look at strong authentication strategies and best practices for these methods on premises and in the cloud.

    Also, we continue our Readers' Top Picks series with a look at enterprise encryption tools. TechTarget polled 1,435 IT and security professionals at medium-to-large enterprises who told us that they have active encryption projects or technology purchases in the next 12 months. Look for a shortlist of products and features from readers who plan to invest in enterprise encryption tools.

    Continue Reading

  • Are cybersecurity lawyers necessary for organizations?

    Cybersecurity lawyers can help handle a variety of enterprise security issues, but are they necessary? Expert Mike O. Villegas discusses the potential benefits.Continue Reading

  • How to combat cloud-based gaming security risks

    There are many security risks for cloud-based gaming platforms. Expert Frank Siemons explains what's happened to gaming providers like Sony and Steam.Continue Reading

  • Developing an incident response policy: Avoiding pitfalls

    Does your enterprise have an effective incident response policy? Expert Kevin Beaver explains some of the mistakes that security managers should be avoiding.Continue Reading

  • Reduce or prevent healthcare cybersecurity attacks

    In this Q&A, the former CIO of Community Health Systems discusses how to prevent healthcare cyberattacks and lessons learned during his career.Continue Reading

  • OPM breach: What's the risk of exposed fingerprint data?

    Millions of fingerprint records were exposed in the OPM breach. Expert Michael Cobb explains how attackers can abuse such biometric data and what enterprises can do about it.Continue Reading

  • Benefits of single sign-on in healthcare

    Does your healthcare organization understand the benefits of single sign-on products? Learn how healthcare professionals quickly log on to multiple applications without much hassle.Continue Reading

  • Ask the expert: HIPAA breaches and the tech most likely to cause them

    It's safe to say HIPAA breaches should be avoided at all costs. One CISO discusses the technology most likely to cause a breach and what to do to ensure compliance.Continue Reading

  • Forming a DR/BC plan for the inevitable data breach

    According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our digital selves -- like mobile computing, cloud and social media -- have not only transformed the way we work, but also how we live. In light of the fact that we also now live in an increasingly cyberthreat-filled landscape, having a comprehensive DR/BC plan is no longer optional for enterprises, says SearchCIO columnist and former CIO Harvey Koeppel.

    In this SearchCIO handbook, Koeppel offers a list of DR principles CIOs can follow to help them design and implement a solid DR/BC plan that will protect both business and personal data when the next disaster strikes. In our second piece, CTO Niel Nickolaisen shares advice on how to get the most value out of DR testing -- without risking damage to your organization. In our last article, writer Mary K. Pratt gathers tips from DR experts on how to craft a DR/BC plan that can tackle any type of disaster, including data breaches.Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading

  • Eight-step data breach plan for the IT organization

    A data breach plan that addresses the many variations a hack can take should consider these eight points.Continue Reading

  • The steps to effective cybersecurity incident response

    Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close