Quantcast
Channel: Data Leakage Prevention – CurrentWare
Browsing all 42 articles
Browse latest View live

AccessPatrol 64 Bit Just Released – Endpoint Security Solution

CurrentWare, a leading Solutions provider of Internet and Endpoint Security, has announced the release of AccessPatrol 4.1.0.7, the mobile device blocking software. The centralized endpoint security...

View Article



Hacktivists On The Rise Compared To Cyber Criminals

According to an annual report released by Verizon, there has been a dramatic rise of “hactivism” – cyber hacking to advance political and social objectives.   The study showed that in 2011, 58% of data...

View Article

Image may be NSFW.
Clik here to view.

BYOD Security Inadequate in Today’s Workplace

The concept of BYOD (bring your own device) is becoming increasingly popular in the workplace.  With rising financial and budgetary constraints, companies are often requesting employees to supply their...

View Article

Twitter Hack Exposes Thousands of Accounts

Over 50,000 email and password combinations were posted to Pastebin earlier this week.   However, Twitter has reported that most of the accounts on this list apparently belong to spammers, with more...

View Article

Is Your Practice Ready For HIPAA Compliance?

As of Sept 23, 2013, organizations handling healthcare data, will be required to be compliant with the privacy and security requirements of the Health Insurance Portability and Accountability Act...

View Article


BlackShades Malware – What is it and Should I be Worried?

Well here we go again, a new threat to personal privacy and another way for people to gain total access to your computer. Only this one’s slightly different because it’s completely legal product. So...

View Article

How to Avoid Phishing

Phishing attempts, two words I hear far too often. I used to think it was truly amazing that people fell for these silly things. After reading more about them, and hearing of some of the clever ones I...

View Article

USB Devices – The Next Large Security Threat?

Blackshades, Heart Bleed, IE exploits, the list goes on. Large security breaches are becoming more and more common unfortunately, and it is difficult to predict where the next one will come from. A...

View Article


Image may be NSFW.
Clik here to view.

Are Cell Phones Risking Your Cybersecurity?

It’s Friday afternoon and in just a few short hours your employees will be making their way out of the office, eagerly venturing off to the exciting weekend ahead of them. Knowing they have a long...

View Article


HIPAA Compliance: What is it & How do I become Compliant?

HIPAA (Health Insurance Portability and Accountability Act) is United States legislation that was enacted in 1996 to create protection standards for the medical and health information of patients. The...

View Article

Image may be NSFW.
Clik here to view.

Internet Filtering & Monitoring For CIPA Compliance

What is the Children’s Internet Protection Act (CIPA) The Children’s Internet Protection Act (CIPA) is a bill that was enacted by the United States Congress in the year 2000. The goal of CIPA is to...

View Article

What is the California Consumer Privacy Act (CCPA)

A new decade is upon us, and with it comes a continuation in the rapid evolution of data privacy laws and regulations. Considered to be the “toughest data privacy law in the United States”, the...

View Article

15 Million Health Records Leaked – Is LifeLabs Doing Enough?

In October 2019, LifeLabs – Canada’s largest diagnostic test provider – disclosed that they fell victim to a malicious ransomware attack, causing the potential leak of sensitive personal information...

View Article


5 Cybersecurity Risks of Remote Workers & How To Mitigate Them

The trend of employees working from home is continuing to rise, with an IWG study showing that 70% of people globally work remotely at least once a week. Whether you call them remote workers,...

View Article

An Overview of Ransomware Attacks in 2019

Ransomware has cost companies an average of $84,116 per ransom in the last quarter of 2019, according to data from Coveware. These figures do not even begin to account for the costs of reputational...

View Article


Don’t Plug In That USB! – How Rogue USB Devices Harm Endpoint Security

Universal Serial Buses (USBs) are incredibly common connectors used in electronic devices such as flash drives, keyboards, external hard drives, desktop fans, and plenty of other devices.  The ability...

View Article

Casting Light on Shadow IT

“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is any system, solution, or software that’s used by the employees of an organization without the knowledge and approval of the corporate...

View Article


Image may be NSFW.
Clik here to view.

How to Develop An Endpoint Monitoring & Management Policy

FAQ: Endpoint Security and Data Loss Prevention Before we begin, we will clarify the key terms that we will be using throughout the course of this guide and answer common endpoint monitoring and...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity for Small Businesses with a Limited Budget

Cybersecurity for small businesses doesn’t have to be expensive, but it is critical. According to the 2019 Data Breach Investigations Report by Verizon, 43% of reported data breaches involved small...

View Article

Image may be NSFW.
Clik here to view.

India and the US Military has banned TikTok – Should You?

Should you ban your employees from using TikTok in the workplace? Data security and privacy concerns have led the US Military, India, and other government entities to ban the use of the app on their...

View Article
Browsing all 42 articles
Browse latest View live




Latest Images