Security

Random entry RSS

  • Posted in:

    What’s the Difference Between Virtual Data Rooms and Google Drive?

    Google Drive is one of the most sought after SaaS cloud storage solutions at the moment together with Dropbox, OneDrive and couple of other industry leaders. The variety of options may confuse corporate decision makers and it’s sometimes hard to pick the right solution for your needs. The situation becomes even more complicated when you look at […]

    Read more

  • Posted in:

    What do Phishing Attacks Really Look Like?

    Hackers using phishing attacks as a security breach method are often sending email messages to users giving the impression they’re representing a company you’re conducting business with, such as a financial or banking institution, or a web service you’re using. Common Phishing Attack Tactics Although the general perception is phishing attacks look fake and everyone […]

    Read more

  • Posted in:

    Understanding the Dangers Hackers Pose to Hospitals With Improperly Secured Cloud Apps

    The healthcare sector is entering a new era with the rise of genomics, big data harnessing, personalized medicine, and more. So, healthcare providers are embracing cloud services to:         Reduce IT costs,         Increase productivity,         Improve service quality. Why do Hospitals Use Cloud Apps? Cloud computing gives hospitals the chance to take advantage of high quality computing resources […]

    Read more

  • Posted in:

    Dropbox’s biggest data breaches and hacks

    Although  a great number of businesses uses Dropbox as their primary file hosting service, few people know how secure their corporate files are. Dropbox is not as insecure as some skeptics would suggest, but recent headlines about data breaches make us question its reliability for business usage. Why Dropbox Breaches Happen?         Anyone can access Dropbox shares […]

    Read more

  • Posted in:

    The dangers of using email for exchanging confidential documents

    Exchange of confidential documents via email has become a dangerous endeavor. This is especially true for law firms, investment banks and corporations. Take attorneys as one example. The bar obligates attorneys to protect the information of the clients, and apart from the financial damage the client may suffer, the attorney can be faced with a potential disciplinary measure. […]

    Read more

  • Posted in:

    Top Cyber Security Risks Affecting M&A Deals

    Businesses of all kinds are vulnerable to cyber attacks. Lloyd’s estimated that businesses lose up to $400 billion per year due to data breaches. With the recent growth in mergers and acquisitions activity — 2015 was the biggest year for M&A ever, according to the Wall Street Journal — deal activity is drawing the attention of cyber criminals. Although there was always the risk of deal information leaking, now that documents are shared electronically, the possibility of unauthorized access to documents is greatly increased.

    Read more