Filter Blogs expand_more
Blog add
Authors add
Solutions add
Products add
Product Categories add
17 Results for 'threats'
Blog

By Entrust Datacard

January 27, 2015

It doesn't matter how big or small your business is, or whether its annual revenue places it on the Fortune 500 list. If you run an enterprise, you are a potential target of cybercrime. It's as simple as that. The problem is that some enterprises don't seem to realize this. Instead of preparing to guard against the multitude of threats out there, they prefer to operate in a mode of futile rationalizing. We're not a big enough business anyway. We don't represent the kind of target that would be lucrative for hackers. These are the types of excuses that organizations fall back on to justify inaction. But this approach is a recipe for disaster. Instead, companies need to stop making excuses and start focusing on coming up with the best cybersecurity plan for them.
Blog

By Entrust Datacard

January 05, 2015

As far as cybersecurity goes, 2014 was nothing short of exhausting. If you were lucky enough to not get hacked yourself, chances are you knew somebody — or, more likely, some business — that was. More than anything, what the past year proved is that hackers are bolder and more sophisticated than ever. And if you thought 2014 was a bad year, then just wait to see what 2015 has in store.
Blog

By Entrust Datacard

May 20, 2015

If you have ever read even a little bit of cybersecurity news, you're bound to hear terms like "virus," "malware," "spyware," and "DDoS attack" thrown around with some frequency. The terms can quickly blur together, and it can become difficult to differentiate between them. Yet businesses operating today need to be able to make distinctions between all the threat types out there, since each and every one poses a unique risk to enterprises. Unfortunately, many business IT departments are not prioritizing cybersecurity at all, let alone setting aside time to learn about the separate threat types that exist. The lack of a proactive cybersecurity strategy within many businesses is not just problematic — it also plainly does not make sense.
Blog

By Entrust Datacard

October 14, 2015

In 2012, the number of people traveling internationally for business and pleasure broke the one billion mark. With more and more people traveling internationally, the burden of securing each of those borders has become mission critical. Security technology is evolving to manage the threats that undermine traditional identity security measures. There is now a global shift to move towards ePassports. Additionally, governments can take steps today that will help alleviate and mitigate the risk of fraud and false identification as citizens and consumers travel, cross borders, vote or access e-gov services. Here are 5 ways governments can prevent weak links in their border security process:
Blog

By Entrust Datacard

June 24, 2016

Entrust Datacard recently partnered with MediaplanetUSA in their just released Data Security campaign which seeks to raise awareness of pressing cybersecurity threats the world is facing today and educate the average online user on how to ward against them. 
Blog

By Entrust Datacard

April 10, 2013

Entrust President and CEO Bill Conner went to the airwaves to chat with David Johnson, of KRLD AM 1080, for a CEO Spotlight segment.
Blog

By Entrust Datacard

February 12, 2016

The White House announced a comprehensive plan on Feb. 9 to strengthen the nation’s cybersecurity, protect America’s privacy and safeguard intellectual property in the face of security threats — which are rapidly increasing in both frequency and sophistication.   
Blog

By Entrust Datacard

January 07, 2016

Shadow IT can be loosely defined as the incorporation of any information technology introduced into an organization that is not necessarily approved by management. 
Blog

By Entrust Datacard

August 19, 2016

What exactly is an insider threat? Concerns about this particular risk vector have risen throughout this decade, especially as the cost of data breaches has surged over the same time period.
Blog

By Entrust Datacard

September 18, 2013

There has been tremendous press coverage over the last week or two about cryptographic systems and threats to their security.
Page 1 of 2