BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    Use Cases and Industries
    See All Products
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Defending your business this Data Privacy Day

October 20, 2017

  • Blog
  • Archive

Since 2007, January 28th has marked Data Privacy Day (or Data Protection Day in Europe), the annual awareness day to promote privacy and data protection best practices. The day is recognized in the United States, Canada, the UK and 26 other European countries through a number of initiatives focused on raising awareness among businesses and personal users about the importance of protecting the privacy of their personal information, particularly in the context of social networking.

In 2013, 73% of the UK population and 87% of the US population accessed the internet every day, and in our workplaces more and more time is spent online. It's also now recognized that social media is the number one online office activity for workers, with 67% using social media at work multiple times a day.

The rise of social media has undoubtedly had an impact on business, not only in terms of employee productivity (both positive and negative), but also the way in which organizations approach IT security. The internet is the greatest window of opportunity for hackers to enter the corporate network, with social media accounts now an increasingly common weak spot.

In recent weeks and months, we've seen a surge in the number of Facebook scams, designed to redirect you to another page and install malware, unbeknownst to the user. We’ve also witnessed a number of fake Facebook login scams where users click to share a post but are asked to login again, allowing hackers to steal username and password information and harvest personal details.

These types of scams are often very targeted. They can be used against specific organisations or groups of people on a range of different social media sites. They can even be used on LinkedIn to send corrupt CVs or job offers. All of these scams and threats can be compounded if they infect a work environment as malware can make its way into the corporate system.

There are of course, ways to mitigate the threat and keep your personal details and those of your employer away from the prying eyes of a hacker. Regularly changing your password, making sure it's alpha-numeric or simply checking the site you're viewing has a padlock or similar symbol in the top left corner of the page can help.

Companies should consider a defense in depth approach to their IT security if they are to protect their IT system from these types of attack and keep their data secure. Evidence suggests that to combat increasingly complex attack vectors, organizations need to adopt a layered strategy that prioritizes high-impact solutions, such as privilege management, application allow listing and sandboxing to contain threats and provide additional peace of mind.

Find out more about how to secure your data with Defendpoint and make data privacy a key priority from today.

Andrew Avanessian,

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Mapping BeyondTrust Solutions to the Identity, Credential, and Access Management (ICAM) Architecture

Whitepapers

Four Key Ways Governments Can Prepare for the Growing Ransomware Threat

Whitepapers

The Operational Technology (OT) Remote Access Challenge

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.