article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

Related: Data privacy vs data security However, this remains a novel concept at most companies. Companies view it as a risk to do business with your firm, whether they’re purchasing products and services or sharing data with you. LW: What approach should mid-sized and smaller organizations take?

article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

When most people think about social media and cybersecurity, they typically think about hackers taking over Instagram accounts or Facebook Messenger scammers taking private information. The Identity Theft Resource Center’s 2022 Consumer Impact Report revealed that social media account takeovers have grown by 1,000% in one year.

Media 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

In other words, users sign in to one account, one single time, and automatically gain access to multiple applications. Supports Business to Business (B2B), Business to Consumer (B2C) and Business to Employee (B2E) activities (e.g., provisioning and de-provisioning a single account). fewer requests to reset passwords).

article thumbnail

ChatGPT at work: how chatbots help employees, but threaten business

SecureList

This article delves deep into the settings and privacy policies of LLM-based chatbots to find out how they collect and store conversation histories, and how office workers who use them can protect or compromise company and customer data. The user creates an account and gains access to the bot. Account hacking.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Has the response strategy been tested and updated on a regular basis, taking into account lessons learned?

Risk 79
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

On the privacy front, California beefed up its consumer data privacy regulations even as Facebook and Apple publicly feuded over how each of these tech giants abuse of consumer privacy and loosey handle sensitive data. Business Email Compromise (BEC) as accounted for over $500 billion in losses.

article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

Though the security industry typically serves the B2B space, there is increasing nuance in the types of clientele served. An end user (specialty also intentionally vague) needs to log in to their account or product interface. But the question remained: what were the specific problems-to-solve for security?