Remove Accountability Remove B2B Remove Data privacy Remove Technology
article thumbnail

Best Practices Q&A: The importance of articulating how cybersecurity can be a business enabler

The Last Watchdog

The technology and best practices for treating cybersecurity as a business enabler, instead of an onerous cost-center, have long been readily available. Related: Data privacy vs data security However, this remains a novel concept at most companies. Shey: Resist the urge to go buy technology as the first step.

article thumbnail

Using social media as a tool to share knowledge on day-to-day Cybersecurity risks

CyberSecurity Insiders

When most people think about social media and cybersecurity, they typically think about hackers taking over Instagram accounts or Facebook Messenger scammers taking private information. The Identity Theft Resource Center’s 2022 Consumer Impact Report revealed that social media account takeovers have grown by 1,000% in one year.

Media 89
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Working from home resulted in additional risk management and security challenges for employees, executive leadership, and information technology (IT) teams. In other words, users sign in to one account, one single time, and automatically gain access to multiple applications. provisioning and de-provisioning a single account).

article thumbnail

ChatGPT at work: how chatbots help employees, but threaten business

SecureList

The technology is becoming commonplace, and its inability to keep up with people’s growing demands has led to complaints that the chatbot is gradually getting dumber. Potential privacy threats Most LLM-based chatbots (ChatGPT, Microsoft Bing Chat, Google Bard, Anthropic Claude, and others) are cloud-based services.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Confirm that the vendor uses industry-standard security technologies and processes.

Risk 81
article thumbnail

ROUNDTABLE: What happened in privacy and cybersecurity in 2021 — and what’s coming in 2022

The Last Watchdog

On the privacy front, California beefed up its consumer data privacy regulations even as Facebook and Apple publicly feuded over how each of these tech giants abuse of consumer privacy and loosey handle sensitive data. Business Email Compromise (BEC) as accounted for over $500 billion in losses.

article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

As I immersed myself in foreign concepts around the information security industry, marketing, and business practices at scale, I grew to appreciate not just the technology we were building at Duo, but the people who built it, the diverse audiences that we addressed, and the unique problems-to-solve around security at large.