Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > Absolute Software > Insiders are Still the Weakest Link in your Data Security Chain
 

Insiders are Still the Weakest Link in your Data Security Chain

White Paper Published By: Absolute Software
Absolute Software
Published:  May 31, 2016
Type:  White Paper
Length:  5 pages

With companies embracing mobility to maintain competitive advantage in the digital era, information security threats have increased exponentially. User-friendly technologies such as mobile devices, mobile apps, and cloud storage are often hacker-friendly too, creating opportunities for cybercriminals to covertly infiltrate company data. This opens the door to data loss, reputational damage, loss of proprietary information not to mention the associated regulatory penalties and potential legal fees. IT bears the brunt of responsibility for information security, yet according to Forrester, internal incidents top the list of security breach causes in 2014.



Tags : 
mobility, competitive advantage, best practices, mobile devices, mobile applications