The 5 Best ‘Tis the Season Security Posts

‘Tis the season to be jolly! We wanted to share the 5 best seasonal posts about security to help everyone stay safe because this is, unfortunately, also the season where Cyber criminals take advantage of unsuspecting people. So let’s make data protection a priority, and end this year on a high note.

Progress With Cloud Storage Policy; But Still A Long Way To Go

Employees no longer need to shrug their shoulders and feign ignorance when asked by their IT teams if they’ve heard of DropBox, out of fear that access to such convenient cloud applications would be blocked. The results of a survey commissioned by WinMagic show that IT teams are now not only aware of the rampant popularity of so-called file-sync-and-share solutions like DropBox—they are moving to support their use.

Keeping up with Healthcare

We’ve been busy lately on the news front and doing our part to contribute to security discussions going on in the Healthcare space. One of the hottest topics we’ve been addressing recently is the affect bring your own device (BYOD) is having on healthcare. 

Bad Habits Coming to Work?

Last week at RSA Conference 2014 we announced the results of a Harris Poll survey we commissioned. It was an interesting process and the data it revealed was not altogether surprising, but the main conclusion one draws from it is frightening for IT professionals.

It Really Can Be That Easy

As I mentioned in my previous blog post, I used to run a small encryption team at a large organization before I came to work for WinMagic. One of the key responsibilities we had was to generate FISMA (Federal Information Security Management Act) compliance reports for NIST SP 800-53, AC-3 and SC-13 controls. What does that mean? Essentially, these are reports that ensure key security standard requirements are met within the organization for Government regulatory purposes.

Windows 8 is here! Now what?

As someone that’s worked in IT for the better part of 14 years, I’ve seen my fair share of product launches. When it comes to operating systems, it’s always a cyclical engine; big flurry of attention at launch followed by mixed reaction to the product.

Keeping up with the Jones’

The evolution of technology goes at a breakneck pace. Whether it’s new products coming to market or updates to existing products – it’s a never-ending cycle.

As a software company that supports multiple Operating Systems (OS), we’re no different and one of the common questions I’m asked has to do with releasing product updates to support various OS updates.

Oh, so you stop hackers and stuff?

What I’d like touch on today with this post is a common misconception about data encryption and security. When I tell people who I work for and what we do, many people assume what we do is protect people from hackers. If people use our software the various security breaches people hear about would be prevented. I’d like to say that we could prevent any kind of hacks etc. but it simply isn’t true.