Outsider threats, while still an important consideration in cyber security, account for only 40% of malicious attacks on your system while 60% potentially come from trusted insiders. Here are 4 important steps to keep in mind.
SAP customers are concerned about identification of data in the SAP system, their pseudonymisation in copies of the production system, and timely information, blocking and finally deletion of user data. This is what users should keep in mind.
Most business processes are not limited to SAP. Sensitive data is exported by users using Microsoft Office applications – a risk that is clearly underestimated. In this article, Holger Hügel (VP, Products and Services), explains inherent risks in data sharing.
On 24th July, NBC News published a rather statistic heavy report by ITRC that presented a paradoxical picture. While on one end, the frequency of data breach in the US has “jumped 29% in the first half of this year”, on the other “cyber security still doesn’t get the respect it deserves”. Strange, but true!
A recent study by Veritas Technologies reveals startling facts about the level of preparedness by companies, especially in Germany. While CISOs and CTOs may state their level of readiness being on track, certain fundamental issues are still, scarily, left unanswered. And the leadership is often clueless about this.
Why should enterprises simplify timely provision of data? GDPR requires companies to localize and provide personal data on request to clients and users within stipulated time. But many, if not most, are unprepared. There are many reasons. Missing Processes For Data Classification is one such. What should companies do?