Today we celebrate Data Privacy Day! Created and led through Stay Safe Online and the National Cyber Security Alliance. This day is celebrated by organizations across the United States, Canada and Europe to create awareness about the importance of privacy and protection of personal information.
With LegalTech fast approaching, it’s more important than ever to understand the challenges of maintaining secure productivity while on-the-go.
Have you heard the term “mobile device management” being thrown around, but you’re not sure what it means? Moreover, do you not know how to implement such a strategy? Read on to learn a few easy and simple tips about managing mobile devices to keep your networks and data safe.
First, an explanation on the concepts in the title of this piece. Data Sovereignty is the concept that digital data and information is subject to the laws of the country in which it is located and/or created. Safe Harbor is an agreement between the USA and EU that regulated and control import, export and processing of personal data and information. And the most recent, EU General Data Protection Regulation (GDPR) is the regulation of “processing’, ownership, rights and storage of personal data and information within the 28 member EU states.
Have you lost track of the number of data breaches that have taken place in 2015? Before the year draws to an end, it’s nearly a certainty that there will be more, and that they will be high profile.
There are two types of bad advice: the kind which doesn’t have a major impact and the kind that costs a great deal of money. When it comes to data security, which type of counsel are you getting? Read on to learn examples of the worst data security advice out there, and what to do instead.
In November at Blackhat Europe 2015, two forensics experts from KPMG Canada presented their findings in a presentation titled “Bypassing Self-Encrypting Drives (SED) in Enterprise Environments”.
When you hear the words “network security,” what comes to mind? Do you believe your network is invulnerable against any threats? And do you think it’s something you don’t need to worry about? If that’s the case, keep reading. This blog post will expose the myths of network security, and what you need to know to keep your corporate data safe.
Have you ever heard the term “media encryption,” and wondered what it meant? Or, perhaps you know what it means, but you don’t think it applies to you. Read on to learn the definition for media encryption and why it’s necessary for everyone to use.
Do you travel for business extensively? Or are you a manager whose employees frequently travel? You should be concerned about data security. Your sensitive information might be at risk from hackers and other criminals. What can you do to make sure your data stays safe? Read on for the secret to protecting data from leaks when you’re on the road.
According to Wikipedia, “in 2014, $50.9 billion was spent during the 4-day Black Friday weekend”. People are eager to jump on the great Black Friday and Cyber Monday deals! What else comes with these amazing sales? Thieves and cybercriminals! They prey on the uninformed organizations that keep their guard down, ready to steal your customer’s credit card information!
When you think of retail, what’s the first thing that comes to mind? It’s probably the sound of a credit card being processed by a cashier. Hackers also hear the noise of a register, only they’re hearing it because they’ve stolen your financial information and are spending your money on merchandise you’ll never use.
This year (2015) the Trusted Computing Group (TCG) Storage Work Group (SWG) published two new specifications derived from the Opal SED specification called Opalite and Pyrite. You may already be familiar with the benefits of using an Opal SED vs software encryption in your laptops and desktops, but are puzzled as to why there are 2 new standards. Perhaps you even wonder if they would be a better fit for your needs than Opal.
It’s all about the data. I have been involved in cloud computing since 1999 (although we called it multi-tenant hosting & ASP – application service provider) and for sixteen years security has consistently been the #1 concern when organizations are asked about their adoption of cloud models. The concern does not reside with the use of a storage array they have no access to or the utilization of a virtual machine cluster in some unknown data center, it’s all about the data and sensitive information.
The thought of provisioning multiple devices can strike fear into the heart of even seasoned professionals. It’s a situation in which a great deal can go wrong, leaving the IT department on the hook. Provisioning multiple devices doesn’t have to be a nightmare, though. Consider this your guide for making multi device security software provisioning simple and hassle-free.
Imagine this: your worst nightmare has taken place. You’ve found out that you’ve been hacked. Your most valuable data is now in someone else’s hands, and your company is going to suffer enormous damage to its reputation. What do you do now? Your first instinct is probably to assign blame. Here’s what you should do instead: ask the following questions about the hack. They’ll help you make sense of it.
In our previous blog posting, we explained WinMagic’s two-stage model for enterprise key file deployment. Enterprise key file deployment is a highly complex endeavor, with many use cases for device provisioning to consider and address; additional challenges include speed, security, and scalability. To overcome these challenges, the WinMagic model leverages pre-boot networking. In this blog posting, we explain the basics of pre-boot networking, examine how it can be utilized to improve key file deployment, and study the benefits provided by using it throughout the enterprise.