Results 1 - 7 of 7Sort Results By: Published Date | Title | Company Name

Calculating the Cost of a Data Breach

Published By: illusive networks     Published Date: May 18, 2016
In 2015, the average cost of a data breach was $3.79 million, a 23% increase from 2013. While a data breach of just average magnitude could be enough to cripple numerous companies, there are still organizations failing to take the necessary cyber security precautions.
Tags : 
illusive networks

SMB Protection: Selecting AV that won't slow you down

Published By: ESET     Published Date: Sep 07, 2011
Selecting an antivirus for your small or medium business that won't slow you down.
Tags : 
eset, antivirus, security, smb, protection, cybercrime, precautions, safety

12 Cybersecurity Metrics Your Vendors (And You) Should Be Watching

Published By: BitSight Technologies     Published Date: Feb 29, 2016
Cybersecurity is an issue facing nearly every organization today—and if you aren’t taking the necessary precautions, your company, customers, and vendors could all suffer.
Tags : 
cybersecurity, security risk, security ratings, security, it management, enterprise applications, data management, it career advancement
BitSight Technologies

The Human Factor in Laptop Encryption

Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence
Absolute Software

Security Essentials for CIO's: Enabling Mobility

Published By: IBM     Published Date: Feb 27, 2014
Learn about the necessary security precautions that must be enabled so your employees can use mobile devices in a world where mobility is key.
Tags : 
security essentials, cio, mobility, security precautions, ibm, bring your own device, byod, mobile computing

Best Practices for Securing Your Enterprise LAN

Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan
AirTight Networks

Dust Explosions - The Dangers and The Precautions Needed To Avoid Them

Published By:     Published Date: Nov 23, 2010
The dangers posed by industrial Dust Explosions can affect a wide range of different industries. This article examines the topic, and gives recommendations on how to prevents such incidents from occurring.
Tags : 
dust explosions, dust control, dust safety, dust hazards, dust collection

Add Research

Get your company's research in the hands of targeted business professionals.