Since the cloud went mainstream, a proliferation of online services and tools have led to the rise of so-called shadow IT, the use of unauthorized third-party services by employees in the workplace. Examples include the use of personal email and cloud storage services, file transfer sites, format conversion websites or popular collaboration platforms such as Wrike or Asana.
Mostly used without ill-intent, through either negligence or for the sake of convenience, these services pose a serious threat to data security because companies are unaware of their use and thus do not know where their data is being processed or whether they are secure channels.
With the EU’s General Data Protection Regulation (GDPR) coming into force on 25 May 2018, companies must now, more than ever, put an end to shadow IT or risk the consequences of being financially penalized under the new regulation.Why…Read more
The omnipresence of the internet, in all aspects of both our private and work lives, has digitized our existence and transformed it into sets of data, valuable to both companies and cybercriminals. While when it comes to businesses, users often agree to share their data as part of a give and take, where services are customized based on their data for a better user experience, sensitive information is also often targeted by malicious individuals through various types of scams and cyberattacks.
It is therefore important that both companies and individuals understand some of the basic, but crucial practices that help keep data secure on the internet. Here are our top five picks:1. Two-factor authentication
Most email providers and internet services now offer two-factor authentication, a way of adding an extra layer of security on top of traditional passwords. It implies the existence…Read more
Data protection legislation is seen as a way for governments to take back control over data security which has suffered critical hits in recent years with major breaches making headlines on a weekly basis. Regulations are a natural reaction to these real-world threats that companies seem powerless to stop. Governments hope that through the enforcement of tougher data protection policies, companies unwilling to take extra measures to ensure data protection will be brought to higher overall standards.
While this goal in itself seems necessary given recent developments, how will these new legislations translate into the business world and how will they affect business growth and the push for innovation? There is a marked concern in business circles that cumbersome overly restrictive data protection regulations, such as the EU’s General Data Protection Regulation (GDPR)…Read more
Released in May 2017, Endpoint Protector 5 came with a modern intuitive user interface, significant backend enhancements as well as new features and a completely redesigned and improved eDiscovery module. The upgrade underlined our commitment to continuing to provide great Data Loss Prevention solutions that address today’s data security needs and concerns.
Since then, our development team has been working hard around the clock to boost existing features and add new ones based on user feedback and industry demands. Today, we are happy to introduce our very first update for the 5th version of our flagship product, Endpoint Protector 18.104.22.168. Let’s take a closer look at some of its highlights.Time and Network based Device Control policies
From this point on, admins will have the option to enable time and network based access rights from Device Control. What this essentially …Read more
The EU’s new General Data Protection Regulation (GDPR) is coming into effect on 25 May 2018 and will have wide-ranging consequences on a global scale, affecting all businesses that trade with the European Union, from within or outside its borders. From among non-EU countries, US businesses in particular have been actively taking steps to ensure that they comply with the new regulation.
With the United States having a number of regulations in place for data protection itself, does that mean companies already compliant with national regulations will find it easier to adjust to GDPR requirements? Let’s have a look at data protection regulations on both sides of the Atlantic to find out.The European Union under the GDPR
The most important and talked about change in data protection regulation in Europe in the last twenty years, the GDPR has set off a race for compliance among companies…Read more
In today’s fast-moving world, highly skilled professionals are constantly looking for more attractive opportunities that will move their careers forward and, as a consequence, companies struggle to retain employees in the long term. Staying in one job for one’s entire life is no longer the primary objective and changing jobs every three to five years is encouraged by every career counselor. According to consulting firm Hay Group, the average employee turnover rate in North America, across all industries, is expected to reach 23% by this year.
What does this mean in the context of data security? In a survey conducted by Biscom, 1 in 4 respondents said they take data with them when they leave a company, 85% of them feeling it is not wrong to take with them materials they themselves helped create. Many of those surveyed admitted that appropriating company data was possible due to companies’…Read more
Last week, Intel made headlines when it was reported by the Register that a security flaw in its processors forced Windows and Linux programmers to redesign their kernels. The news sent Intel stock plummeting and the cybersercurity community into a panic as further details of the extent of the vulnerability were revealed.
Since the initial news broke, several independent teams of academic and industry security researchers from around the world, among them Google’s Zero Project, confirmed they have identified three possible attacks that could exploit processors’ design security flaws. These were dubbed Spectre (variant 1 and 2) and Meltdown (variant 3).
Google had identified and informed affected companies about the possibility of Spectre attacks as early as June 2017 and Meltdown towards the end of July 2017, but chose not to make the information public to allow companies…Read more
The beginning of the New Year is a time when many companies consider the most pressing issues they have to solve in the upcoming year. With 2017 turning out to be one of the most taxing years for data security in memory, 2018 will be the year when companies will have to fight back by building up better defenses against breaches and leaks. Whether out of their own concern or obligated by new legislations, businesses’ New Year resolutions should feature data protection at their core.
Here are our top picks for what companies should be focusing on when it comes to data loss prevention in the New Year:1. Become GDPR compliant
This point should come as no surprise to any business dealing with customers located in Europe. The EU’s General Data Protection Regulation (GDPR) will come into full force on 25 May 2018 and companies that will not align its policies to the new legislation’s strict regulations…Read more
With 2017 coming to an end, the clock is ticking closer to the implementation of the EU’s new General Data Protection Regulation (GDPR) on May 25th 2018. While interest in issues of compliance surrounding the dreaded new legislation has soared in recent months, a great number of companies have yet to take concrete measures to ensure their businesses are up to the new standards before the deadline.
So what does it take to start your journey to compliance? Here is a short compliance check to get you started!
Whether your company is located within the European Union or outside it, you are required to comply with all requirements of the GDPR if any of your customers are EU data subjects. You must also bear in mind that the GDPR restricts cross-border data transfer outside the EU. For free data flow to occur cross-border, a third country must be deemed to have an adequate level of data protection …Read more
With the holiday season around the corner, many employees are taking extended holidays, some choosing to work remotely to enjoy longer stays with their families. This adds an extra layer of peril to data security as work laptops and devices head out of the safety of company networks and into the busy and often times dangerous world of international travel and public internet.
Some of the most common cases of data loss occur when employees are on the move, with devices forgotten or stolen from public places. Trust in insecure networks can also lead to potential breaches and company sensitive data winding up in the wrong hands.
As remote work becomes a staple of the modern work environment, it is however up to the company to step up and ensure that their employees both understand how to keep their data safe while working remotely, but also take measures to prevent incidents from occurring.