All posts by author

Andrada Coos
Andrada Coos is Senior Copywriter at CoSoSys and uses her international writing expertise in the IT and public policy fields to write compelling and engaging stories that people want to read. Having worked in both Western Europe and Asia, she brings a global perspective and an insatiable curiosity about all things technological to CoSoSys’ growing marketing team.


Debunking the Top 3 Myths about DLP

While the rise of data protection regulations such as the GDPR in Europe and HIPAA, FISMA and NIST in the US has lead to an increased awareness of the need for Data Loss Prevention tools to ensure compliance, many companies still hesitate to employ them because they fall victims to some of the common myths that plague DLP software since its infancy.

Here are the most prevalent three charges brought against DLP tools and why they are unfounded:

1. Productivity killer

A myth that has persistently haunted DLP is its negative impact on productivity. It is blamed for making usually easy tasks time-consuming, thus hindering employees’ efficiency and increasing their frustrations. As all myths, this bit of misinformation started from a grain of truth: it’s a remnant of former inadequacies of first generation DLP tools which, as any new technology just being developed, was still difficult…

Read more

The Endpoint Protector Team at it-sa India 2018

June 7, 2018 Author: Events 0 Comments

India’s first it-sa IT security expo and conference took place between 24-25 May 2018 at the Bombay Convention and Exhibition Centre in Mumbai and was organized by NürnbergMesse India with the support of the Indo-German Chamber of Commerce.

Prompted by the major drivers of the IT security market in India which include the expansion of its internet coverage areas, increased mobile device use and data theft as well as the rise of globalization and liberalization among others, it-sa India’s aim is to support the creation of a global expertise with a local perspective on the Indian subcontinent.

The expo showcased information security products and services from all areas of cybersecurity including research and security consulting. The conference program, powered by Deloitte, featured discussions and presentations on a series of relevant themes such as Artificial Intelligence,…

Read more

The Best Data Protection Practices for the Global Era

In the age of globalization and ultra-connectivity, companies are increasingly multinational: they have regional or local offices in more than one country and do business in many more. This invariably involves a lot of meetings and presentations for important clients and the visiting of niche fairs and conferences abroad. As a consequence, the work force has become more and more mobile and, due to the rise of portable devices, they can bring the office with them wherever they go.

While this level of flexibility has a positive impact on companies’ bottom lines, it can spell disaster for data security. The reason is fairly simple: security measures for data protection are often restricted to company networks and once data heads outside them, it can become vulnerable to theft and loss.

What can organizations do then to ensure that their data remains secure even when it heads outside the…

Read more

Time’s Up! The GDPR is Now in Full Effect

May 25, 2018 Author: Compliance 0 Comments

The last two weeks have been met with varying degrees of panic by companies big and small trying to finalize GDPR compliance before the new legislation’s enforcement on 25 May 2018. What feels like a million emails were sent with updated privacy policies and requests for continued subscription. But now that the dreaded deadline is here, how will companies fare in this brave new GDPR-compliant world? Let’s have a look at some of the key factors to consider.

A country by country case

As a regulation, the GDPR is applicable across all member states without the need for each country to pass national laws. However, each member state has its own data protection laws which will need to be aligned to the GDPR.

The new regulation also contains more than 70 opening clauses which allow member countries to modify the provisions set within them to implement stricter or laxer rules than those set out …

Read more

It’s time for Infosecurity Europe 2018! Will you be there?

May 11, 2018 Author: Events 0 Comments

The region’s number one information security event, Infosecurity Europe 2018, is back at the Olympia in London this June and the Endpoint Protector team wouldn’t miss it for the world. Over the years, Infosec Europe has become one of the essential stops on our DLP experts’ annual global itinerary. With the most comprehensive conference programme in the region, over 400 exhibitors showcasing their solutions and products, and 19,500+ information security professionals in attendance, how could it not be?

This year, attendants can choose from 240+ free to attend conference sessions led by industry influencers that address some of the information security sector’s biggest concerns: how to build the cybersecurity team of the future, what AI and quantum computing mean for information security, how information security can add value to digital transformation, and third-party…

Read more

New CLOUD Act Adds Fuel to Privacy Debates

May 10, 2018 Author: Compliance 0 Comments

The Clarifying Lawful Overseas Use of Data (CLOUD) Act was signed into law by the US President on March 23rd as part of the 2,000-page Spending Bill. The new piece of legislation addresses a controversial debate that has been raging in the US since the notorious United States v. Microsoft case, in which the tech giant refused to hand over data stored on its Irish servers to the FBI, first made headlines: can US law enforcement officials request access to data stored in another country by a company operating in the US?

CLOUD settles the argument firmly on the side of law enforcement by making it easier for them, whether they are local police or federal forces, to directly request that US tech companies hand over data regardless of where it is stored. The executive branch will also now have the power to sign executive agreements with foreign governments that want access to data stored in the US, all…

Read more

GDPR Essentials: Data Protection Impact Assessments, When and How Should They Be Conducted?

May 4, 2018 Author: Compliance 0 Comments

As we enter the home stretch towards the enforcement of the EU’s General Data Protection Regulation (GDPR), with only three weeks to go until 25 May 2018, we take a closer look at one of the key requirements of the new legislation: Data Protection Impact Assessments (DPIAs).

Meant to help companies identify, assess and minimize the data protection risks of projects, DPIAs are not necessarily a new idea. A similar concept, Privacy Impact Assessments (PIAs), have been widely considered to be valuable tools for companies looking to reduce risks resulting from their data processing activities. However, because of the lack of an industry-wide agreement on how these should be conducted, companies have often found themselves at a loss when it came to carrying them out.

Through DPIAs, the GDPR has now made assessments mandatory by law in the case of processing activities which may result…

Read more

France’s CNIL Takes a Pragmatic Approach to GDPR Implementation

April 26, 2018 Author: Compliance 0 Comments

The French data protection authority, the Commission Nationale de l’Informatique et des Libertés (CNIL) has taken a very active role in clarifying what French businesses’ responsibilities will be under the EU’s General Data Protection Regulation (GDPR), coming into force on 25 May 2018. Issuing everything from guidelines for processors and SMEs to toolkits and templates, CNIL has taken a hands-on approach to demystifying the GDPR and providing clear steps towards achieving compliance.

The French DPA sees the GDPR as having a strong focus on accountability and transparency which are reflected in the regulation’s emphasis on creating products and services that take into consideration data protection by design and by default as well as the establishment of internal policies, procedures and tools that guarantee an optimal protection of individuals’ personal…

Read more

Five Steps to Take to Protect Your Data

Data has become ubiquitous: from business processes and applications to smart phones, tablets and printers, the places data is stored and processed have moved beyond the confines of traditional network infrastructure and, implicitly, outside its protection mechanisms.

As a consequence, data breaches have become increasingly common, leading to a global movement towards the adoption of stricter regulations for the protection of users’ personal data. Notably, the EU’s General Data Protection Regulation (GDPR) is seen as a trailblazing legislation that enforces individuals’ rights and makes companies accountable for the security of the data they process.

But while compliance is important to avoid fines, the threat of data breaches should be a wake-up call to all companies, no matter which country they operate from or where their customers are located. As seen daily in…

Read more

GDPR Essentials: The Right to Erasure, Who Can Request it and How is it Applied?

April 12, 2018 Author: Compliance 0 Comments

Time is ticking: the implementation of the EU’s General Data Protection Regulation (GDPR) is less than 7 weeks away and companies are still struggling to come to terms with compliance. While some have already passed their audits and feel confident as we draw nearer to finding out the full extent of the GDPR’s enforcement, others are just now taking the first precautionary steps towards compliance.

Among the many requirements organizations must comply with, the right to erasure is one of the thorniest. A recent survey by big data application provider Solix found that 65% of respondents were unsure whether their companies can fully and permanently purge personal information from their systems. But what does the right to erasure imply, who does it apply to and, more importantly, what must companies do to comply with it? Let’s find out!

The right to be forgotten and the right to erasureRead more