Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Larceny and loss

Below you will find reports with the tag of “Larceny and loss”

image from 2021 BYOD Security Report

2021 BYOD Security Report

The 2021 BYOD Security Report reveals these security challenges and offers fresh insights on the state of securing mobility, the technology choices organizations are making, and their response to the growing security risks associated with remote work and enterprise mobility. (more available)
Added: October 24, 2022
image from Cost of a Data Breach Report 2021

Cost of a Data Breach Report 2021

The 17th edition of the Cost of a Data Breach report. Focuses on survey derived information to determine the cost of data breach incidents. (more available)
Added: July 28, 2021
image from Cost of a Data Breach Report 2020

Cost of a Data Breach Report 2020

The 2020 update of this survey-based review of the costs of a data breach, as reported by practitioners in the field. (more available)
Added: July 30, 2020
image from 2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

2017 Survey Results Cybersecurity: Can Overconfidence Lead to an Extinction Event?

In early 2017, SolarWinds MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMBs and enterprises, split equally across the UK and the US. (more available)
Added: February 18, 2020
image from Healthcare Breach Report 2019

Healthcare Breach Report 2019

Bitglass’ fifth annual Healthcare Breach Report analyzes the data from the US Department of Health and Human Services’ “Wall of Shame. (more available)
Added: March 26, 2019
image from The State Of The Federal IT Landscape

The State Of The Federal IT Landscape

From the report, “For the State of the Federal IT Landscape report, OneLogin commissioned CITE Research to conduct an online, in-depth survey of 150 federal IT professionals in the United States. (more available)
Added: February 8, 2019
image from The State of Enterprise Encryption and How to Improve It

The State of Enterprise Encryption and How to Improve It

A new survey by UBM and Vera Security explores the use of encryption and access controls to understand how organizations currently use these technologies and to identify their top priorities in file security. (more available)
Added: January 17, 2019
image from Identity Security Trends In The Mobile Era

Identity Security Trends In The Mobile Era

To better understand the mindset and priorities of those who make security decisions for mobile devices in the workplace, Ping Identity conducted a mobility survey in partnership with Gatepoint Research. (more available)
Added: November 27, 2018
image from Healthcare Breach Report 2016: What a Difference a Year Makes

Healthcare Breach Report 2016: What a Difference a Year Makes

This report, answers the questions, “why are hackers now targeting healthcare data?” and, “how did they conduct large scale attacks that affected millions? (more available)
Added: October 25, 2018
image from 2018 Cost Of A Data Breach Study: Global Overview

2018 Cost Of A Data Breach Study: Global Overview

IBM Security and Ponemon Institute are pleased to release the 2018 Cost of Data Breach Study: Global Overview1. They conducted interviews with more than 2,200 IT, data protection, and compliance professionals from 477 companies that have experienced a data breach over the past 12 months. (more available)
Added: October 24, 2018
image from 6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

6 Questions To Ask Before Implementing A Vulnerability Disclosure Program

This guide provides some thoughts about implementing a Vulnerability Disclosure Program.
Added: October 24, 2018
image from 2016 Cost of Data Breach Study: Global Analysis

2016 Cost of Data Breach Study: Global Analysis

This global study examines 383 companies in 12 countries. It finds that $4 million is the average total cost of a data breach. (more available)
Added: October 23, 2018
image from 2015 Cost of Data Breach Study: United States

2015 Cost of Data Breach Study: United States

This year’s study examines the costs incurred by 62 U.S. companies in 16 industry sectors after those companies experienced the loss or theft of protected personal data and then had to notify breach victims as required by various laws. (more available)
Added: October 22, 2018
image from 2015 Cost of Data Breach Study: Global Analysis

2015 Cost of Data Breach Study: Global Analysis

In this report, they examine two factors that affected the financial consequences of a data breach. The first is executive involvement in their organization’s IT security strategy and response to data breaches. (more available)
Added: October 21, 2018
image from Building Technology Infrastructure For Learning

Building Technology Infrastructure For Learning

This report from the Department Of Education provides insight into good technoglogy infrastructure for educational purposes.
Added: October 20, 2018
image from Five Reasons Why You Need Endpoint Backup

Five Reasons Why You Need Endpoint Backup

As its title states, this white paper provides five reasons why you need endpoint backup, specifically a centralized backup service.
Added: October 19, 2018
image from Securing Health Data In A BYOD World

Securing Health Data In A BYOD World

Health Organizations are increasinly using BYOD to adminster care in their facilities. With this technological advancement comes major security concerns. This paper looks at those issues and discusses what can be done to protect Health Data. (more available)
Added: October 19, 2018
image from An Emprical Analysis of Cyber Security Incidents at a Large Organization

An Emprical Analysis of Cyber Security Incidents at a Large Organization

This is a study into organisations’ attitudes towards the cyber threat, the management control processes they have in place, and their understanding and use of cyber insurance as a means of risk transfer. (more available)
Added: October 16, 2018
image from Just in Time Research: Data Breaches in Higher Education

Just in Time Research: Data Breaches in Higher Education

This “Just in Time” research is in response to recent discussions on the EDUCAUSE Higher Education Information Security Council (HEISC) discussion list about data breaches in higher education. (more available)
Added: October 15, 2018
image from Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

The Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals that the majority of healthcare organizations represented in this study have experienced multiple data breaches. (more available)
Added: October 15, 2018
image from Beginner's Guide To Encryption

Beginner's Guide To Encryption

Device Authority’s Beginners’ Guide to Encryption is designed to help you understand the basics of how encryption works, why it matters, and what challenges are facing encryption in the new landscape of the Internet of Things (IoT). (more available)
Added: October 14, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2023
Library updated: February 1, 2023 04:08 UTC (build 051771c)