A look back at the first year of GDPR

May 15, 2019

The first year of GDPR started slow, but companies and regulators alike are picking up speed. Our new infographic shows GDPR’s first year by the numbers. Unless you’ve been on a worldwide cruise for the last year (with no Wi-Fi), there’s little doubt you’ve heard of GDPR—the European Union’s General Data Protection Regulation. GDPR went into effect May 25, 2018, and severely affected companies’ ability to use, store, transmit, and process individual consumers’ data without their express permission. Now that GDPR is about a year old, let’s look at the state of compliance and what’s on the horizon for GDPR. Download the PDF, and read our analysis below.

Spotlight

DefenderSoft, Inc

Defendersoft was formed around the understanding that the SMB space was under served. Enterprise focused security groups have historically ignored the varied needs of this space. We understand that your team is tasked with building “best practice” security policy for your environment utilizing existing or in many cases, ever shrinking IT budgets. Attacks have become more destructive and focused than ever before. The opportunity for virus threats, spyware, and phishing attempts are higher than ever.

Other Infographics
news image

Help Your Employees Overcome Cybersecurity Fears by Promoting Cyber Awareness

Infographic | January 23, 2020

Increased cyber awareness has never been more important for businesses and consumers, as U.S. data breaches continue to increase at a record pace and are predicted to reach an all-time high of over 1,000 in 2017. This increase seems to have contributed to a growth in consumer concerns, as our recent research revealed that consumers’ worries about identity theft and cybercrime are now on par with other common concerns such as illnesses and car accidents.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Crowdstrike Incident Response

Infographic | June 13, 2022

A modern approach to rapid response and recovery from today’s widespread security incidents. Navigating the best path through the labyrinth of a widespread ransomware attack will determine the organizational impact and recovery cost to the business.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More

Spotlight

DefenderSoft, Inc

Defendersoft was formed around the understanding that the SMB space was under served. Enterprise focused security groups have historically ignored the varied needs of this space. We understand that your team is tasked with building “best practice” security policy for your environment utilizing existing or in many cases, ever shrinking IT budgets. Attacks have become more destructive and focused than ever before. The opportunity for virus threats, spyware, and phishing attempts are higher than ever.

Events