Data privacy in the digital age: Why you need employee social media guidelines

Data privacy in the digital age: Why you need employee social media guidelines

Gini was excited to start her new role as sales executive at a small yet growing IT startup. She was thrilled when one of her sales leads responded positively and accepted her invite for a face-to-face meeting.

She posted on her social media page:

“So glad to get a lead moving up the pipeline. Hope to convert Fraser & Co in Monday’s meeting!”

Do you think Gini closed the deal?

Nope. In fact, she lost her job.

But, why?

Gini had shared confidential client and sales information on a public domain. Friends and competitors browsing her posts pounced on the lead and closed the deal for themselves before she could. The IT firm fired Gini for violating its data privacy rules and ruining a good sales opportunity.


(more…)

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

3 tech hacks to accelerate value gained from Symantec Endpoint Protection features

Investing in data and information security ranks number three for small and midsize businesses that are prioritizing their tech budgets for 2019, according to a recent survey.

But, purchasing and installing security software is only half the job. You must also maintain the software—through regular updates, deployment on new endpoints, and customized configurations—to ensure that it meets your specific business needs and is able to deliver on protecting your business against cyberattack attempts.

Symantec Endpoint Protection is one among the many security software solutions on the market from which small businesses can gain more value if implemented and used correctly. Optimizing the use of all Symantec Endpoint Protection features will ensure maximum return on your investment (ROI).

(more…)

Data archiving vs. backup: Which does your small business need?

Data archiving vs. backup: Which does your small business need?

Small businesses owners often confuse data archiving with data backup (and vice versa) and end up purchasing the wrong software tools. But the truth is: Data archiving and data backup serve two different and clearly distinct purposes.

Why archive: Regulations such as MiFID II and Sarbanes-Oxley require you to store information for five to seven years. Archiving software helps store data for these long periods at lower costs compared to other file storage or data backup tools. Archiving tools help to clear up your storage space and move older data to a different storage system.

(more…)

Cloud data protection, IoT, and active threat detection: Key IT security predictions for 2019

Cloud data protection, IoT, and active threat detection: Key IT security predictions for 2019

The cyber-risk landscape is constantly facing new threats like botnets and cryptocurrency mining hacks.

Understanding IT security trends is not only important for tackling these new security challenges as they crop up; it’s vital for appropriating sufficient funds to your cybersecurity budget in 2019.

Our research suggests that more companies are investing in security technology solutions to protect their businesses against cyberattacks. Cybercrimes, such as targeted ransomware attacks, spear phishing, and crypto jacking, are expected to increase in 2019, costing businesses billions of dollars in lost revenue, ransom payments, and damage control.

(more…)