How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and resources against the scourge of social engineering-based cyber-attacks, including security awareness training, phishing simulation, cybersecurity posture assessments etc.
With digital transformation becoming the watchword of the first half of the 21st century, what is the outlook on this trending topic now and in the future?
In this article, we look at how digital transformation has revolutionized businesses with the latest trends and technologies, including blockchain, DevOps, cloud computing, data privacy and artificial intelligence, just to name a few.
What are the some of the lessons learned from the recent and unarguably massive Capital One data breach?
In this blog article, we take a look at what happened and what we can do to prevent our own organization from suffering a data breach.
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house?
In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.
Industries and cities across the globe are turning to smart technologies to solve complex problems. In doing so, they generate and analyze subject data to feed intelligent applications. This brings enormous responsibility in ensuring the ethical use of these data. In applying a privacy-enhanced and ethical approach when building technological solutions, we must start by embracing the idea of Ethical by Design. Learn more about data privacy and ethics in our latest blog post.
If you owned gold bars, would you keep them safe? Of course you would. Gold is valuable but so is personal data. It may not seem on the surface to have the same value as gold, but to our customers, it can represent their very identity. We must now ask ourselves: what does Canadian data privacy legislation do to help us protect our data? Data privacy has become incredibly important for businesses.
Organizations that fall under the remit of retail and manufacturing have to often deal with both general data protection regulations and industry-specific ones, such as financial transaction security. This is the third article in our series on data security and protection regulations in different industries, this time about retail and manufacturing. Whilst the first two posts on the finance sector and healthcare looked at very specific regulations, this sector has a wider scope.
Healthcare, like other industry sectors, has become part of the new wave of digital transformation. The industry is heavily dependent on digital data, including highly sensitive patient data. Therefore, healthcare has been the target for cybercrime for many years; health information is a valuable commodity which is not lost on cybercriminals.
In this second post about data security regulations, we are turning our attention to data security regulations in the healthcare industry, including HIPAA and HITECH.
Our economic landscape is filled with a mosaic of specific data security rules and regulations across multiple industries such as finance, healthcare and retail. In this blog article, we provide an overview of some of the most commonly-cited data security regulations for the financial services industry, including GLBA, SOX, PCI DSS, 23 NYCRR 500 and several others.
Hitachi Systems Security is a Global IT Security Service Provider who builds and delivers customized services for monitoring and protecting the most critical and sensitive IT assets in your infrastructures 24/7