Boldon James - HelpSystems Company Logo

More PHI Breaches Caused By Providers, Insiders, Report Says

Reading Time: 3 minutes More Protected Health Information (PHI) is leaked by healthcare providers, not hackers, academic research by Michigan State University and Johns Hopkins University released Monday says. Researchers say that when it comes to data breaches, more than half of the… Read More

Deploy Multiple Defence Layers To Protect Data-Rich Applications

Reading Time: 3 minutes What should organisations be doing to address application layer attacks and reduce the likelihood of a breach through this type of attack? The first step any organisation needs to take to protect itself against an application layer attack is… Read More

In Terms Of Main Threat Actors, Expectation Rarely Matches Reality

Reading Time: 2 minutes Netwrix conducted a study of the major IT risks that are significant for most organizations and assessed respondents’ readiness to withstand cyber threats. The report is based on the feedback of 1,558 organizations of various sizes from many different… Read More

Tesla Data Theft Case Illustrates the Danger of the Insider Threat

Reading Time: 3 minutes Tesla filed a lawsuit against a former employee this week after it learned he made changes to company source code and exported gigabytes of proprietary data to unknown third parties. Tesla CEO and business magnate Elon Musk learned a… Read More

With GDPR upon us, here’s what the C-Suite needs to know about cybersecurity

Reading Time: 4 minutes The EU General Data Protection Regulation (GDPR) is finally upon us. That means if your organisation handles data on any European citizens, you will need to pay attention. The good news is that the rising profile of cyber-threats over… Read More