• Reset
incident response for saas

How to apply incident response for SaaS?

If you don’t have an incident response plan in place, then you need to create one ASAP. An incident response plan, as defined by NIST, is a “set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber attacks against an organization’s information systems.” Basically, your incident response plan is […]

read more
is microsoft secure

Is your data secure on Microsoft Teams?

Microsoft Teams has fast become a staple in the modern workplace. Each day, more than 145 million people use it for business communications. In a world where people are rarely in the office five days a week, Team facilitates the rapid communication and data sharing that employees need today.  However, while communicating is certainly easy […]

read more

Why Google Drive’s native DLP isn’t enough 

Today, more than five million businesses pay to use Google Workspace. Even if your business is a Microsoft Office lover, there’s a high probability that at least some of your employees use tools like Google Docs and Google Sheets–whether you know about it or not! It’s easy to see why people love Google Drive and […]

read more
what is NIST framework

What is NIST framework?

The technology industry is still technically in its infancy. Every year, it seems that innovation hurls forwards in leaps and bounds. At the same time, the cyber security risks that organizations face are constantly evolving too.  Because everything is, well, so new, there’s a lack of standards and rules out there for mitigating cyber risk – […]

read more
hipaa remote work

How is HIPAA being upgraded for remote work?

It’s been a long time since there’s been any update to the Health Insurance Portability and Accountability Act (HIPAA). But, this year, things are going to change with new additions to the HIPAA privacy rule expected to be announced in the coming months. Read on to discover how HIPAA will evolve this year and what […]

read more
how to secure IAM

How to secure identity and access management

Verizon’s Data Breach Investigations Report found that stolen credentials were the top causes of data breaches for the fourth year in a row. In our hyper-connected, primarily remote, SaaS-dominated working world, email addresses and passwords are the lock and keys of employee productivity. Unfortunately, though, if hackers get their hands on these details, they could steal a […]

read more
BEC

How does business email compromise (BEC) occur?

These days, everyone’s heard of ransomware. It’s touted as the most threatening form of cybercrime out there.  But, actually, it’s not. The FBI’s annual cybercrime report found that Business Email Compromise (BEC) attacks account for losses that are a massive 64 times worse than ransomware. While ransomware contributed $29 million in losses, BEC caused over […]

read more
cloud DLP for PHI

5 ways cloud DLP helps secure PHI

The healthcare sector has a problem. It’s trying to innovate, embrace new ways of working and adopt the cloud. To an extent, it’s doing this successfully but, then, when we look at data breach figures we see that, for many companies, this innovation is coming at a cost. For the last ten years, the healthcare […]

read more
data security FS Slack Teams

Data security challenges posed by Slack & Teams for financial services

As the financial services (FS) sector embraces new ways of working and digital transformation, communication tools like Slack and Teams are helping employees to find new efficiencies and better collaborate with partners, customers and clients. Platforms like Slack and Teams are highly versatile–and they are constantly adding new functionality that makes them more appealing to […]

read more
SaaS data security

How to secure data in your SaaS-based collaboration tools

Introduction *News flash*. Your cloud applications are a massive data security risk. We’re not saying don’t use cloud apps, but we are saying: invest in securing them properly. Otherwise, you risk the fallout of a data breach and hefty compliance fine. Here’s everything you need to know about SaaS apps and data security. What’s a […]

read more
what CASB is best

What CASB is right for my business?

If you’re reading this, then chances are you’re in the market for a cloud access security broker (CASB). It’s a good decision; more than 80% of enterprise workloads are now in the cloud, and employee reliance for cloud applications–like Slack, Teams and Office 365–continues to soar with the rise of hybrid work. Like all technology solutions, CASBs […]

read more

Get Polymer blog posts delivered to your inbox.