NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Defending your business this Data Privacy Day

October 20, 2017

  • Blog
  • Archive

Since 2007, January 28th has marked Data Privacy Day (or Data Protection Day in Europe), the annual awareness day to promote privacy and data protection best practices. The day is recognized in the United States, Canada, the UK and 26 other European countries through a number of initiatives focused on raising awareness among businesses and personal users about the importance of protecting the privacy of their personal information, particularly in the context of social networking.

In 2013, 73% of the UK population and 87% of the US population accessed the internet every day, and in our workplaces more and more time is spent online. It's also now recognized that social media is the number one online office activity for workers, with 67% using social media at work multiple times a day.

The rise of social media has undoubtedly had an impact on business, not only in terms of employee productivity (both positive and negative), but also the way in which organizations approach IT security. The internet is the greatest window of opportunity for hackers to enter the corporate network, with social media accounts now an increasingly common weak spot.

In recent weeks and months, we've seen a surge in the number of Facebook scams, designed to redirect you to another page and install malware, unbeknownst to the user. We’ve also witnessed a number of fake Facebook login scams where users click to share a post but are asked to login again, allowing hackers to steal username and password information and harvest personal details.

These types of scams are often very targeted. They can be used against specific organisations or groups of people on a range of different social media sites. They can even be used on LinkedIn to send corrupt CVs or job offers. All of these scams and threats can be compounded if they infect a work environment as malware can make its way into the corporate system.

There are of course, ways to mitigate the threat and keep your personal details and those of your employer away from the prying eyes of a hacker. Regularly changing your password, making sure it's alpha-numeric or simply checking the site you're viewing has a padlock or similar symbol in the top left corner of the page can help.

Companies should consider a defense in depth approach to their IT security if they are to protect their IT system from these types of attack and keep their data secure. Evidence suggests that to combat increasingly complex attack vectors, organizations need to adopt a layered strategy that prioritizes high-impact solutions, such as privilege management, application allow listing and sandboxing to contain threats and provide additional peace of mind.

Find out more about how to secure your data with Defendpoint and make data privacy a key priority from today.

Andrew Avanessian,

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Microsoft Vulnerabilities Report 2022

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.