Bitglass, a Silicon Valley-based data protection company orchestrated an investigation to try and track where stolen data gets sent post-breach. The company discovered that in just a dozen days, a single stolen document traveled to twenty-two countries, was viewed over a thousand times and was downloaded around fifty times. Hot beds for where the information was accessed was northeastern Asia and western Africa.
This shows that stolen information and data can be shared with inappropriate parties with tremendous ease, and proves the need for security best practices to be implemented across a business or organization.
If you have any further questions regarding this information or are looking for advise on security best practices, email
W. Jackson Schultz – Security Consultant at firstname.lastname@example.org
Nate Gravel – Director of Information Security Practice at email@example.com
In this blog post, we discuss how outsourcing cybersecurity operations to a vCISO can help businesses, including SMBs, tackle the cybersecurity talent shortage.
In this blog post and video, we explore need-to-know privilege in cybersecurity and why it’s important for organizations to assign user permissions on a need-to-know basis.
In this blog post, we discuss the importance of email security for businesses and explore the VIPRE and Sendmarc email protection technology solutions.