Employees are often cited as one of the top reasons data loss occurs. Whether negligent or malicious, insiders, with high levels of physical and digital access to sensitive information, have the power to inflict the most damage to a company’s data security. According to the IBM X-Force Threat Intelligence Index 2017, negligence accounts for up to 53% of all cyberattacks businesses suffer, depending on the industry sector, while malicious insiders only for up to 25%. However, ill-intent, because it intentionally targets valuable information, is the biggest danger a company faces from the inside. Therefore, it is well worth keeping an eye on disgruntled employees.
Warning signs include virulent disagreements with management or company policies, poor evaluations that might spark discontent and transition to other places of employment. Companies often see a spike in sensitive…Read more
Cloud services have become a crucial and integrated part of modern IT systems and their security has been continually debated since their emergence. Big cloud service providers such as Amazon and Salesforce have argued that their systems benefit from the kind of heavy-duty state-of-the-art security features smaller businesses are unlikely to ever invest in, making their data less vulnerable in the cloud than on their own servers. However, using cloud services opens data up to easier access and potential breaches. It is, in fact, one of its biggest selling points: data access from anywhere anytime. And while it’s in tune with today’s increasingly mobile, globalized world, it also means that companies have to deal with more vulnerabilities, not necessarily from the cloud services themselves that, as stated above, have taken security concerns very seriously, but from one of …Read more
Standing as testimony to innovation, strength, and uniqueness, the Marina Bay Sands is accommodating once again the RSA Conference Asia Pacific & Japan between 26 and 28th July. The event is bringing together information security experts just like the MBS is connecting its host city, empowering organisations and individuals to stay ahead of cyber threats.
We are happy to exhibit this year as well and we would like to invite you to join us at booth E92 where our colleagues from CoSoSys Far East are looking forward to welcoming you. For those of you whose presence at events in the US or Europe is more difficult, this is a great opportunity to meet the people behind the Endpoint Protector technology and see live demos, whether you are already using it, you are evaluating it or just looking around for Data Loss Prevention software. We will make sure your visit will be worth your while, dedicating…Read more
With recent surges in hacker attacks and leaks, it seems that sensitive data has never been more vulnerable. And with every aspect of businesses becoming digitized, we are increasingly relying on third party solutions, whether antivirus, Data Loss Prevention, encryption and other solutions to keep our data safe.
Sensitive data comes in different shapes depending on the sector a business is part of. It can take the form of credit card numbers, medical records or social security numbers, but regardless of its actual content we can distinguish three different states it can be found in: data at rest, data in use and data in motion. These three types of data present different levels of vulnerability and different challenges when it comes to their protection.
Data at rest is static data stored on hard drives that is archived or not often accessed or modified. Data in use refers to data that is …Read more
The countdown has started to the implementation of the EU General Data Protection Regulation (GDPR) on 25 May 2018. With less than a year to go until the new regulations come into force, companies are scrambling to get their GDPR ducks in a row.
We here at CoSoSys have already put together a handy guide to what GDPR is and how Endpoint Protector can help our clients achieve compliance. However, during our recent participation in InfoSecurity Europe 2017, the question we were most frequently asked was in regards to the role Data Loss Prevention can play in the rush for compliance so we decided to address the issue here on the blog as well.What is GDPR and how will it affect your business?
The GDPR was a regulation jointly issued by the European Commission, the European Parliament and the Council of Ministers of the European Union to strengthen and unify data protection for EU citizens.
It is the …Read more
Last year, New York became the 1st state that proposed cyber security regulations for the financial organisations. This year, on March 1st, the New York Department of Financial Services (NYDFS) Cybersecurity Requirements came into effect.
This new regulation requires financial institutions like banks and insurance companies, and others to establish and maintain cybersecurity programs in order to protect consumers’ private data. Financial organisations have an 180-days transition period to enhance their infosec implementation in order to protect their Information Systems and Nonpublic Information (NPI). By August 28, 2017, must have a cybersecurity program in place and starting February 15, 2018, they must be able to demonstrate they are compliant by submitting annual Certifications of Compliance.What is the Information…Read more
Apple announced the upcoming release of its macOS 10.13, dubbed High Sierra, at the Apple Worldwide Developers Conference(WWDC) 2017 keynote event in San Jose earlier this month. It brings many under the hood changes along with some new eye catching updates for everyday users.
The Cupertino-based company is clearly starting to take into account the thousands of Macs used across enterprises with some updates aimed to improve the management and configuration of large scale Mac deployments. High Sierra will bring new MDM configurations such as the 802.1X Ethernet, management of firmware passwords and user accounts, tools to shut down and/or restart macOS remotely, FileVault key escrow and restrictions to iCloud desktop and documents. It will also include the ability to delay software updates for up to 90 days so IT teams can test them before installation.
The most notable change in…Read more
Between 6-8 June, security specialists once more descended on the Olympia in London for Europe’s biggest information security event, Infosecurity Europe 2017. Amid stunning Victorian architecture, vendors from across the globe unveiled their latest projects and their most successful products to a crowd of enthusiastic guests from across a multitude of industries. CoSoSys participated for the 4th time this year and our team was on hand to present and guide visitors into a demonstration of our Data Loss Prevention solutions.
Playfulness was the name of the game in the exhibition area, with the Olympia’s Grand Hall highlighting not only the tremendous growth and diversity of the information security sector, but also the creative way the over 360 vendors present have learned to showcase their products. CoSoSys was no exception: our booth’s…Read more
The premier gathering of security leaders, Infosecurity Europe, delivers every year significant insights into the data security world through the exhibition area as well as the conference programs. The event is a great opportunity for IT security professionals and business managers to find inspiration for their data protection challenges in terms of approach and solutions to implement. Infosecurity Europe is the largest and most comprehensive conference program in the region, featuring over 360 exhibitors showcasing the most relevant information security solutions and products to 13,500 visitors.
We are exhibiting at Infosec Europe for several years now and we are looking forward to this year’s edition. The team will be ready to showcase our latest product update – Endpoint Protector 5 – with the updated eDiscovery module, the redesigned, responsive…Read more
We are excited to unveil the newest version of our Data Loss Prevention solution: Endpoint Protector 5, presenting important updates and a brand new redesigned interface. Our aim, as always, is to constantly enhance the data protection features, while offering an intuitive user experience.
Endpoint Protector 5 presents some essential changes.
With a more intuitive design, the complex process of securing data becomes easier. IT Admins can benefit from a more user-friendly, modern, and responsive interface of the management console.
Key features and benefits of the new UI include:
- Faster access to certain features, such as DLP blacklists and whitelists, which have been included in the main menu as a separate section
- Flexibility – IT Administrators are now able to manage policies and check reports from any device, from desktop to tablet due to the responsive console