Securing computers, servers, and IoT devices is an ever-changing process. As organizations work to keep environments secure, there is always one constant, inevitable challenge – USERS.
‘Tis the season to be jolly! We wanted to share the 5 best seasonal posts about security to help everyone stay safe because this is, unfortunately, also the season where Cyber criminals take advantage of unsuspecting people. So let’s make data protection a priority, and end this year on a high note.
Next week we head to Boston, MA for the Campus Technology 2014 event. With a number of key customers that are in the education space, we have a solid grasp of the needs and complexity of dealing with data encryption in education.
Employees no longer need to shrug their shoulders and feign ignorance when asked by their IT teams if they’ve heard of DropBox, out of fear that access to such convenient cloud applications would be blocked. The results of a survey commissioned by WinMagic show that IT teams are now not only aware of the rampant popularity of so-called file-sync-and-share solutions like DropBox—they are moving to support their use.
It’s spring, and with the new season we bring new features and functionality to SecureDoc.
When I attended the Gartner Security & Risk Management summit a couple of weeks ago, I attended a session about Encryption Planning Made Simple. It was a good look at some of the issues facing organizations today and the barriers to the adoption of data encryption solutions.
This week I’ve been in National Harbor, MD attending the Gartner Security & Risk Management Summit. As a newcomer to this event, it’s been a whirlwind few days delivering excellent content and insights into key market trends and customer needs.
As I mentioned in my previous blog post, I used to run a small encryption team at a large organization before I came to work for WinMagic. One of the key responsibilities we had was to generate FISMA (Federal Information Security Management Act) compliance reports for NIST SP 800-53, AC-3 and SC-13 controls. What does that mean? Essentially, these are reports that ensure key security standard requirements are met within the organization for Government regulatory purposes.
The evolution of technology goes at a breakneck pace. Whether it’s new products coming to market or updates to existing products – it’s a never-ending cycle.
As a software company that supports multiple Operating Systems (OS), we’re no different and one of the common questions I’m asked has to do with releasing product updates to support various OS updates.
What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from hackers. If people use our software the various security breaches people hear about would be prevented. I’d like to say that we could prevent any kind of hacks etc. but it simply isn’t true.