Data Security

The Importance of Active Directory Security Best Practices

February 9, 2022

Directory Security
There’s no silver bullet solution to cybersecurity, a layered defense is the only viable defense. Active directory (AD) security best practicesare crucial because they are central to many vulnerable functions, such as Network access.

Spotlight

Bloombase

Bloombase is a worldwide provider and innovator in Next-Generation Data Security solutions from Physical/Virtual Data Centers, through Big Data, and to the Cloud. Bloombase provides turnkey, non-disruptive, defense-in-depth data at-rest protection against dynamic cyber threats in heterogeneous storage environments, while simplifying the IT security infrastructure. Bloombase is a trusted standard for Global 2000 scale organizations that have zero tolerance policy for security breaches and data leakage. Specialties information security, cryptography, transparent encryption, data loss protection, anti outbound threat, anti data tampering, and unified critical data protection.

Other Infographics
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Alarming Cyber Security Stats to Know in 2022

Infographic | June 29, 2022

Attackers use multiple tactics to get access to your credentials and among those phishing is the most commonly used method. Every 9 out of 10 cyber-attacks start with a phishing email and end up costing millions of dollars to the organizations.

Read More
news image

Data Loss Prevention Best Practices

Infographic | March 16, 2022

Every organization, regardless of size or industry, needs a data loss prevention (DLP) strategy to prevent data from being improperly accessed or deleted.

Read More
news image

Cybersecurity in Retail Infographic

Infographic | February 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More

Spotlight

Bloombase

Bloombase is a worldwide provider and innovator in Next-Generation Data Security solutions from Physical/Virtual Data Centers, through Big Data, and to the Cloud. Bloombase provides turnkey, non-disruptive, defense-in-depth data at-rest protection against dynamic cyber threats in heterogeneous storage environments, while simplifying the IT security infrastructure. Bloombase is a trusted standard for Global 2000 scale organizations that have zero tolerance policy for security breaches and data leakage. Specialties information security, cryptography, transparent encryption, data loss protection, anti outbound threat, anti data tampering, and unified critical data protection.

Events