When you think of data breaches, the first thing that likely comes to mind is a hooded figure in a dimly-lit room plotting theft of all your valuable data. But according to a study published by CompTIA it isn’t an unknown hacker that’s most likely to directly...
The growing popularity of bring-your-own-device (BYOD) usage in the workplace is a headache for the IT department. One security measure being implemented by some companies is “geo-fencing,” which limits sensitive data that can be accessed if the device is a certain...
One-quarter of Fortune 500 companies do not have specific policies in place on how to protect intellectual property from cyber attacks, according to a new study. Furthermore, one-third of the 500 have no policies on how to protect personal identifying information. ...