Boldon James Logo

More PHI Breaches Caused By Providers, Insiders, Report Says

More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

How Can Companies Move The Needle On Enterprise Cloud Security Risks And Compliance?

More than ever, customers understand their right to data privacy. As major brands continue to lose sensitive data to cybercriminals in high-profile cloud security failures, customer trust in companies across industries is fading. Only 25 percent of consumers believe… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organisation’s data, its importance and the level of protection required… I always figured that you would need to know what you have in… Read More

You will lose data…

You will lose data, if you haven’t already.  That impact of that data loss will vary from innocuous low impact to a highly costly sensitive data-breach, and everything in-between.  Why am I so sure? People are lazy. Yes that… Read More