Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
54 Results for 'enterprise'
Blog

By Entrust Datacard

April 27, 2015

The same cyberattack can mean different levels of severity for different businesses. It boils down to each company's level of security. To illustrate how significantly enterprise preparation can determine the outcome of a cyberattack, we've devised a hypothetical cybercriminal scenario alongside with three different companies, each of which have different levels of cyber preparedness. Let's see how these three different businesses fare when hit with the same attack.
Blog

By Entrust Datacard

April 29, 2015

In the first part of this piece, we introduced the idea that it's not so much the strength of the cyberattack that determines its impact — it's the preparedness of the business that's targeted. For this reason, a single attack can have vastly different effects depending on different levels of enterprise security. In the last article, we presented three businesses with different approaches to network security. Let's see how each of the three businesses respond when hit by this intrusion. The lesson here: There's no such thing as being halfway prepared for a cyberattack. As a business, you either have the tools to combat cybercrime or you don't — there's no middle ground.
Blog

By Entrust Datacard

October 03, 2013

Within the enterprise space, there currently exists the need for fast and secure movement across separate, secure digital platforms. That solution comes in the form of a federated identity—a type of access that is receiving ground-swell support on the government level.
Blog

By Entrust Datacard

November 19, 2014

In today's cybercrime-heavy world, no sector is spared the devastating impact of a breach — particularly not when there's money or private data to be stolen. But fortunately there are steps companies can take to ensure they never join the ranks of the breached. Entrust Datacard sheds some light on some of those steps to stop enterprise breeches. 
Blog

By Entrust Datacard

December 15, 2014

Entrust dispels the cybersecurity myths that many modern enterprises buy into whether or not they are true. Misconceptions that have the potential to have detrimental impacts on overall organizational protection. Discover what these myths are.   
Blog

By Entrust Datacard

December 19, 2014

New year's resolutions tips from Entrust for boosting your enterprise security in 2015.
Blog

By Entrust Datacard

April 28, 2014

Entrust focused on an ongoing fallout of a breach on major retailer Michael's illustrates how a large scale cyberattack can happen to any type of operation. Recovery from a major attack is by no means a quick process, and fully restoring a company's reputation may be outright impossible. This is a lesson that Michael's will have to learn the hard way.
Blog

By Mike Byrnes

January 19, 2015

The digital world is constantly evolving. More organizations are using mobile, cloud and social media solutions as vessels to connect and communicate with their employees, customers and citizens. Social media platforms such as Twitter, YouTube and LinkedIn provide real-time channels to communicate our news, views and also can be a critical tool for public safety used to inform the public. Last week, the announcement of an attack on US Central Command (CentCom) social media accounts made headlines.
Blog

By Entrust Datacard

January 21, 2015

Cybersecurity isn't in the periphery anymore. It's not something you give five minutes of thought to at a corporate meeting and then forget about for the rest of the year. Instead, it's front and center. It's in the headlines. It surrounds us all the time - whether we're reading the newspaper or going to the movies. And now, it's reached the Oval Office.
Blog

By Entrust Datacard

January 27, 2015

It doesn't matter how big or small your business is, or whether its annual revenue places it on the Fortune 500 list. If you run an enterprise, you are a potential target of cybercrime. It's as simple as that. The problem is that some enterprises don't seem to realize this. Instead of preparing to guard against the multitude of threats out there, they prefer to operate in a mode of futile rationalizing. We're not a big enough business anyway. We don't represent the kind of target that would be lucrative for hackers. These are the types of excuses that organizations fall back on to justify inaction. But this approach is a recipe for disaster. Instead, companies need to stop making excuses and start focusing on coming up with the best cybersecurity plan for them.
Page 1 of 6