The past year has presented challenge after challenge for corporate IT teams. Managing the forced office exodus caused by the pandemic was no small feat, and that was just the beginning, with the subsequent emergence of a plethora of security threats representing one of the biggest challenges to business continuity most organisations have ever encountered.
The 2021 Global Data Risk Report by Varonis revealed some interesting insights about why data loss happens. In the report, they found that, on average, 33 percent of the total number of folders used by companies is open to everyone.
Cyber security is a highly volatile, changing landscape by its very definition. Ensuring efficient defensive posture requires continuous threat monitoring, developing defensive strategies to meet them, and implementing new countermeasures.
Companies have had to swiftly adapt to support a remote workforce since the emergence of COVID-19. With remote working poised to become the norm, IT and network managers are rethinking their technology roadmap. Many face choosing between VoIP and UCaaS solutions for their business communication needs.
For almost a year, the events industry has faced huge difficulties, with innumerable cancellations and many organisers now having to postpone for a second year or, once again, take their events virtual.
For all the hundreds and thousands, we spend behind protecting our physical privacy and security, the irony is that most individuals and even businesses remain pretty lax about the most valuable thing stored in their networks.
The demand for people with specialist data skills — like data scientists for example — has more than tripled over the last five years (+231%). With nearly every single sector, including banking, transport and retail generating an explosion in data, employers are desperately on the hunt for skilled experts who can make sense of it.
Most enterprise security teams are already drowning in a sea of sensor and scanner data that needs to be manually correlated, analysed, and interpreted. No easy task when you take into account the growing volumes of vulnerability data and the increasing complexity of today’s enterprise IT environments.