article thumbnail

Pharma Industry Seeing Reduction in Data Breach Costs, But Still Have Much to Do

KnowBe4

Insights from IBM’s Cost of a Data Breach Report on the Pharmaceutical Industry shows that while the overall cost has improved, there are clear areas of risk that need to be addressed.

article thumbnail

Encryption – A Feasible Savior against Prevalent Privacy Issues in Business Communication

Security Affairs

Impact of Privacy & Security Issues in Business Communication. Encryption plays an integral role in securing the online data as well as its integrity. Similarly, they should use business VPN services , such as PureVPN , to create a secure channel for their remote employees. Final Thoughts. Pierluigi Paganini.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News Alert: CybeReady issues a summer saeson guide outlining 5 workforce security strategies

The Last Watchdog

— CybeReady, a global leader in security awareness training, today announced the release of its informative guide, “Five Workforce Security Strategies to Consider During Summer Holidays.” The Summer Guide focuses on employee awareness and vigilance while on vacation. Santa Clara, Calif. Download the guide here.

article thumbnail

French Data Protection Authority Issues 2008 Annual Activity Report

Hunton Privacy

The CNIL is increasingly engaged in assisting companies to ensure individuals’ privacy rights as part of diverse technology projects like Streetview, Bluetooth advertising and implementation of an electronic pharmaceutical database.

article thumbnail

GUEST ESSAY. Everyone should grasp these facts about cyber threats that plague digital commerce

The Last Watchdog

Regardless of how familiar you are with Information Security, you’ve probably come across the term ‘malware’ countless times. Related: Companies must bear a broad security burden. Security warnings keep popping up, urging you to take immediate action or install a particular security product. Trojan horse.