• Reset
how to secure IAM

How to secure identity and access management

Verizon’s Data Breach Investigations Report found that stolen credentials were the top causes of data breaches for the fourth year in a row. In our hyper-connected, primarily remote, SaaS-dominated working world, email addresses and passwords are the lock and keys of employee productivity. Unfortunately, though, if hackers get their hands on these details, they could steal a […]

read more
BEC

How does business email compromise (BEC) occur?

These days, everyone’s heard of ransomware. It’s touted as the most threatening form of cybercrime out there.  But, actually, it’s not. The FBI’s annual cybercrime report found that Business Email Compromise (BEC) attacks account for losses that are a massive 64 times worse than ransomware. While ransomware contributed $29 million in losses, BEC caused over […]

read more
cloud DLP for PHI

5 ways cloud DLP helps secure PHI

The healthcare sector has a problem. It’s trying to innovate, embrace new ways of working and adopt the cloud. To an extent, it’s doing this successfully but, then, when we look at data breach figures we see that, for many companies, this innovation is coming at a cost. For the last ten years, the healthcare […]

read more
data security FS Slack Teams

Data security challenges posed by Slack & Teams for financial services

As the financial services (FS) sector embraces new ways of working and digital transformation, communication tools like Slack and Teams are helping employees to find new efficiencies and better collaborate with partners, customers and clients. Platforms like Slack and Teams are highly versatile–and they are constantly adding new functionality that makes them more appealing to […]

read more
SaaS data security

How to secure data in your SaaS-based collaboration tools

Introduction *News flash*. Your cloud applications are a massive data security risk. We’re not saying don’t use cloud apps, but we are saying: invest in securing them properly. Otherwise, you risk the fallout of a data breach and hefty compliance fine. Here’s everything you need to know about SaaS apps and data security. What’s a […]

read more
what CASB is best

What CASB is right for my business?

If you’re reading this, then chances are you’re in the market for a cloud access security broker (CASB). It’s a good decision; more than 80% of enterprise workloads are now in the cloud, and employee reliance for cloud applications–like Slack, Teams and Office 365–continues to soar with the rise of hybrid work. Like all technology solutions, CASBs […]

read more

Why is email still the biggest source of sensitive data leaks?

Buckle up… It’s time for some hard truths about your company’s security. You might think that you’re doing every right. You train your employees, use anti-virus and anti-malware technologies, and have an email filter solution in place. Unfortunately, that isn’t enough to protect yourself from today’s breaches–and it’s definitely not enough to meet compliance standards […]

read more
dataleak

What is the difference between a data breach & data leak? 

In the world of cybersecurity threats, you’ve probably heard the terms’ data leak’ and ‘data breach’ used interchangeably. While these incidents have some things in common, they are two very different terms. To effectively protect your data, you need to know the risks it faces; this means having a thorough understanding of data leaks and data breaches. […]

read more
Slack security risks

Top 3 Slack data security risks

  In a little over a decade, the collaboration tool Slack has catapulted into popularity, becoming one of the most widely used SaaS collaboration tools globally. Nowadays, 43% of Fortune 100 businesses use Slack, and it is beloved by startups and small-to-medium sized businesses around the US.  But, while Slack may be great for collaboration […]

read more
critic

A field guide to data governance (TechGC Webinar)

A discussion moderated by Yasir Ali (founder, Polymer) I recently moderated a panel for a TechGC webinar with 150+ leading general counsels in attendance. There was a lot of ground we covered on the topic of data governance and challenges in implementing it.  Following are some key takeaways relevant to any organization that is looking […]

read more
Website By Need - SOC2

Why is data loss prevention failing financial services?

For an industry as highly regulated as financial services, these stats may surprise you:  Financial services cyberattacks in 2020 due to data breaches cost organizations an average of $3.86 million and took an average of 207 days to identify.  Cyberattacks on financial institutions in 2020 exposed an average of 352,771 sensitive files. The average financial […]

read more

Subscribe to Polymer blog