As we reported in this issue of FierceITSecurity, the Federal Communications Commission has joined the Federal Trade Commission in doling out fines for poor data security practices.
The Federal Communication Commission intends to impose its first fine for lax data security. The agency is alleging that TerraCom and YourTel America stored Social Security numbers, names, addresses, driver's licenses, and other personal information of their customers on unprotected Internet servers.
The Government Accountability Office says the Consumer Financial Protection Bureau comes up short in protecting the consumer credit card and mortgage loan information that it collects.
At a recent security conference in London, a researcher was able to hack into the web interface of a wireless Canon Pixma printer, used extensively by small and medium-sized enterprises and run the video game Doom on the printer's menu screen, Ars Technica reports.
Enterprises need strong BYOD policies in place or they risk having a major data breach, warns IT services firm ITC Infotech.
BYOD can enhance employees' productivity and their willingness to work extra hours, yet there are BYOD pitfalls that companies need to avoid.
Google has released two security audits to the public in an effort to ease data security concerns of its cloud, enterprise and education customers, CNET reports.
Whether your organization is embracing a BYOD or a CYOD program, ulitmately what are most important are the steps you take to secure company data. Here are some steps on how to do just that.
Protecting company data has always been a difficult challenge, and with every passing day it becomes harder to do. As Mary-Pat Cormier says in her guest post today, "companies have become aware that the risk of being hacked is unavoidable." Fortunately, she has some very good advice to share on what to do to financially and legally protect your company before and after a breach.
Nearly 36 percent of IT security professionals admit to sending sensitive data outside of their organizations without using any form of encryption to protect it, a new survey from Voltage Security found. The survey showed that almost half of respondents are not de-identifying any data within their organizations.