If you’re like most people, you use tools like DropBox or Box to send and share your files via the Cloud. But how do you know that the files you share via these tools are safe? Do you trust the Cloud service provider and the security measures they’ve put in place? How sure are you that these security measures are foolproof?
In a previous blog I wrote that at Black Hat Europe 2015, two forensics experts from KPMG Canada presented their findings in a presentation titled “Bypassing Self-Encrypting Drives (SED) in Enterprise Environments”.
When you move into a new place, one of the first things you do is change all the locks. It’s important to your sense of security that you control who has access to your home. Changing the locks just makes logical and practical sense. This same logic should also be applied to your business thinking when you are looking to secure your sensitive information in a new environment or an environment you don’t fully control.
Earlier this month, WinMagic announced the general availability of the new security software solution that provides full enterprise controlled key management and encryption for virtual works load running in public and private IaaS environments, SecureDoc CloudVM.
Can you remember the last time you installed security updates at work? If the answer to that question is “no,” that’s a big problem. Patches and updates protect computers from dangerous threats. Read on to learn why installing security updates across your corporate network can save your firm from disaster.
Holistic, comprehensive security strategies, centered on protecting data, not devices, are easier than ever thanks to current encryption technology. According to a recent Ponemon Institute study, over the last five years healthcare organizations have slowly increased their investment in data security along with new technologies to better protect Protected Health Information (PHI).
Who gives you advice on mobile device security? Unless that person is an expert in the field, he or she is most likely giving you the wrong information. We’ve compiled some of the worst advice we’ve ever heard about mobile device security – read on to learn why following it can actually do more harm than good.
I once again had the pleasure and privilege of attending the largest security conference in the world; the 2016 RSA Security Conference in San Francisco. This year’s conference was well attended with a reported 40,000 attendees. This is up from fewer than 20,000 just a few years ago.
Years ago, tech experts predicted that a new wave of technology would hit the scene and completely rework the way we, well, work. Cloud computing was viewed as the future of the enterprise – at the time, this mysterious yet highly intriguing concept promised to dramatically increased efficiencies that would enable companies to reduce costs and increase business flexibility.
In a discussion sweeping the tech (and consumer) world, it’s easy to suffer from “Apple vs. FBI” information overload. Here at WinMagic, we’ve been closely following the developments of the story and understand Apple’s firm stance. In an effort to break the story down (and share some of our own thoughts) here are the nuts and bolts of the Apple vs. FBI case.
Arguably the world’s largest and most important Cybersecurity show is just around the corner. With over 30,000 attendees and over 500 highly specialized security specific exhibitors, it is the show which the industry benchmarks itself.
Over the past several years, it seems as though we can’t go a week without another business getting hacked. The hacks that make the news have millions of victims, or their victims are high profile organizations such as Sony or the NSA. However, even if hackers don’t steal data from millions of people, they’re still expensive. Read on to learn why even “small” hacks are a big deal.