All posts by author
We use the word “enterprise” for a good reason. Big companies or enterprises with more than 500 employees represent complex ecosystems with incredible resources, structures and more importantly, substantial know-how and data. Information security in these organizations is quite challenging and requires significant efforts from several departments and business unit managers, not only the IT department. But does the joint effort really exist? Or it is only a desire of the idealistic IT security vendors? What other recommended practices are not followed in enterprises?
Let’s see what are the 5 most common data security mistakes enterprises can’t afford to make:1. Failing to make information security a business component
In an enterprise, let’s say, in the clothes manufacturing industry, having a data breach with the unreleased clothes designs is as bad as delaying…Read more
Cloud Access Security Brokers (CASBs) became popular in 2016 and are continuing to get attention from companies, research analysts, and the media. They have emerged as a response to the security and compliance issues caused by cloud adoption and offer visibility into data security threats related to cloud apps usage. CASBs usually sit between users and cloud apps, acting like a gateway to intercept users’ activity and offer control and compliance. The interesting part is that they combine a sum of functionalities from different other existing solutions – firewalls, SIEM, Data Loss Prevention, encryption, and others.
Just to make sure CASBs are not confused with other tools, let’s see what CASBs can and cannot do to secure your data.CASBs CAN
1. Provide visibility into cloud apps use
CASBs can detect file uploads and downloads and data traffic for approved or unapproved apps…Read more
We are very happy to let you know that we have been included in the February 2017 Gartner Magic Quadrant for Enterprise Data Loss Prevention. As new entrants, we are proud to be positioned the furthest in the Niche Players quadrant.
Vendors have been evaluated based on the ability to execute and the completeness of vision. These two dimensions include several criteria like product or service, overall viability, sales execution/pricing, market execution, customer experience, innovation, and other business and technical aspects. All criteria and their weight are detailed in the report.
We believe one of the factors for our inclusion by Gartner was our ability to help organizations protect data against leakages and theft on Windows, macOS, and Linux, with support for printers, terminal servers and other virtual desktop infrastructure (VDI) thin clients. We also think that a big contribution…Read more
Last year, Mark Zuckerberg, has incidentally revealed the simple security measures he takes to secure his MacBook: webcam and mic covered with tape. In short time, the story was covered by many news outlets, drawing everyone’s attention to the security issues. Many asked themselves why he would do such a paranoid thing. Is Mark’s fear of being seen and listened justified? If we think about the possibilities of exploiting webcams, and the fact that there’s even the smallest chance of being watched or heard without our permission, then, Mark’s concerns are totally legit. Taking into consideration the level of success of its business, he has been probably the target of many cyber attacks attempts.
Just imagine yourself sitting home, having a glass of wine and working on your laptop in your pajamas when suddenly your webcam light starts to blink, recording every…
Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about this solution with you.What is Enforced Encryption?
For some time now, Enforced Encryption has become a best practice for security in case of USB devices, e-mail, internal HDDs, communications protocols, etc. Currently, we provide Enforced Encryption for USB devices allowing organizations to remotely deploy EasyLock, USB encryption software through Endpoint Protector 4 and thus forcing users to use only encrypted devices while transferring data. Instead of denying access to these devices, which would be unpractical, with the USB Enforced Encryption you protect data in case USB drives are lost or stolen.
Enforced Encryption is used for two strong reasons:…Read more
There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.
Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.1. Make sure key people are aware of the changes
Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed of the legal changes the GDPR imposes and should make sure they translate them into plain,…Read more
I didn’t learn about data security in middle school or high school. Chances are, neither did you and, probably most of your kids either. The majority of schools do not have special programs or curriculum to emphasize the importance of data security or even a solid implementation for their networks to prevent data breaches. But data security and privacy should be a mandatory subject in all schools and universities and, along the pupils or students, professors, and other staff should also be trained, just like in any organization.
Think also about the fact that today’s millennials are entering the labor market, ending up handling companies’ critical data. Future generations will probably be even more connected to technology and the Internet, so it’s not too late to start information security classes in schools and other education facilities. If kids and students don’t have…Read more
In 2016 – the year of IoT innovations, wearable technology, and cloud computing – we have discovered some interesting facts. What is considered by many an “old-fashioned”, obsolete or close to extinction tool – the USB storage device–plays an interesting role in today’s work environment. Aside from the many customers that have implemented our Device Control solution to monitor and control how portable storage devices, like USB thumb drives, are being used, we also wanted to get a pulse from the 2016 Infosecurity visitors. Therefore, one of our main objectives as an exhibitor at this year’s event, on top of showcasing our DLP and MDM solutions, was to gather more information about visitors’ policies towards the use of USB devices. We conducted a research by surveying 180 respondents working in organizations from different verticals, most of them from the UK, but…Read more
Infosecurity is Europe’s largest conference on information security, featuring over 315 exhibitors and presenting the most diverse range of products and services. There will around 12,006 unique visitors from every segment of the industry. This year’s edition, like the previous one, will be held at Olympia, London from 7th to 9th June 2016. You can check the venue program and location here.
We will attend as an exhibitor for the 3rd time to showcase our main product: Endpoint Protector 4, cross-platform award-winning DLP solution.
“We are glad to participate for the 3rd time as exhibitors at the Europe’s biggest Infosecurity conference and exhibition. During the entire event, our team will greet visitors at our booth with insights into DLP technology and 1:1 demos. We invite you to join us for 3 days of great interactions,” says Roman Foeckl, founder and CEO of CoSoSys.…Read more
The quality of the services and safety are extremely important in the hospitality industry. Hotels do not only have to ensure their guests feel welcomed and comfortable but also safe and safety goes further than safe deposit boxes for valuable assets or money that most hotels provide in each room. Hotels are obliged to protect their customers’ data against data leakage, theft or loss and to secure it against cyber attacks. People usually are not aware of this, but hotels hold a lot of private records, like credit card numbers, e-mail addresses, company data, for business travelers, ID numbers, and other sensitive data. I was never curious how hotels protect or what they do with my personal details, but that’s something that each of us should investigate. You wouldn’t want your vacation to turn into a disaster because the hotel where you are staying suffered a breach and you have to …Read more