Beyond the pandemic: Why are data breach costs at an all‑time high?
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
Phil has been an IT journalist for over 16 years. He started out as a reporter on UK enterprise IT title IT Week and then Computing in 2005 and moved up to the role of News Editor before leaving to pursue a freelance career. Since then, Phil has written for titles including The Register, where he worked as Asia correspondent from Hong Kong for over two years, MIT Technology Review, SC Magazine, and others. In addition to contributing to WeLiveSecurity, he also writes for InfoSecurity Magazine, IDG Connect and a range of other IT news and feature sites.
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
Phil MuncasterAs employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
Phil MuncasterHow can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
Phil MuncasterNow that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose
Phil MuncasterThe Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.
Phil MuncasterLessons to learn from the Kaseya cyberincident to protect your business' data when doing business with a MSP.
Phil MuncasterHow can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers?
Phil MuncasterWhat does the increasingly fuzzy line between traditional cybercrime and attacks attributed to state-backed groups mean for the future of the threat landscape?
Phil MuncasterOSINT can be used by anyone, both for good and bad ends – here’s how defenders can use it to keep ahead of attackers
Phil MuncasterHow do vishing scams work, how do they impact businesses and individuals, and how can you protect yourself, your family and your business?
Phil MuncasterA year into the pandemic, ESET reveals new research into activities of the LuckyMouse APT group and considers how governments can rise to the cybersecurity challenges of the accelerated shift to digital
Phil Muncaster