All posts by author
In recent years, the number of Mac computers has visibly grown among consumers, mainly because of their modern design and features, built-in security and ease of use.
Even so, there is still a common misconception prevalent within companies when it comes to buying Macs for the workforce, the assumption being that they are not affordable compared to the costs of Windows PCs. But when you compare the TCO (Total Cost of Ownership) of Macs and Windows PCs, Mac is the clear winner.
Last year, Fletcher Previn of IBM had a presentation at the Jamf tech conference, where he talked about the usage and costs of Macs vs PCs inside IBM, proving that the total cost of ownership of Macs is significantly lower. The number of Macs increased inside IBM, by the end of last year, reaching 100.000 Mac users. From the total number of Mac users, only 5% needed help-desk support, versus 40% of PC users, resulting in lower…Read more
Last year, New York became the 1st state that proposed cyber security regulations for the financial organisations. This year, on March 1st, the New York Department of Financial Services (NYDFS) Cybersecurity Requirements came into effect.
This new regulation requires financial institutions like banks and insurance companies, and others to establish and maintain cybersecurity programs in order to protect consumers’ private data. Financial organisations have an 180-days transition period to enhance their infosec implementation in order to protect their Information Systems and Nonpublic Information (NPI). By August 28, 2017, must have a cybersecurity program in place and starting February 15, 2018, they must be able to demonstrate they are compliant by submitting annual Certifications of Compliance.What is the Information…Read more
The premier gathering of security leaders, Infosecurity Europe, delivers every year significant insights into the data security world through the exhibition area as well as the conference programs. The event is a great opportunity for IT security professionals and business managers to find inspiration for their data protection challenges in terms of approach and solutions to implement. Infosecurity Europe is the largest and most comprehensive conference program in the region, featuring over 360 exhibitors showcasing the most relevant information security solutions and products to 13,500 visitors.
We are exhibiting at Infosec Europe for several years now and we are looking forward to this year’s edition. The team will be ready to showcase our latest product update – Endpoint Protector 5 – with the updated eDiscovery module, the redesigned, responsive…Read more
When it comes to data protection and regulatory compliance, most of the organizations are not taking into consideration all risk factors that could hinder the security process. The lack of awareness and preparation can lead businesses into failing to protect their company data and preventing data breaches that could cost them their reputation.No BYOD Policies
According to a research study, uncontrolled user access to data and poor management of where data is stored are two of the biggest mistakes regarding a company’s data security.
Reaching compliance is already a complex process, but companies allowing their employees to transfer data inside and outside the network makes it even more difficult. No employee training or monitoring, along with no BYOD policies is a sure road to failure for any business.
The study shows that a lot of IT professionals (69%) allow employees to transfer…
Financial institutions often deal with data breaches due to the huge value financial records hold for external attackers or malicious insiders. A data security incident in financial organizations can have multiple negative ramifications for both the organization and the owners of the leaked data.
Last year a series of data breaches occurred in the financial sector: Citizens Bank, Nationstar Mortgage, Central Bank of Russia, TD Bank, Bangladesh Bank, and many others. One of the major causes was the significant rise of phishing attacks, especially CEO spear phishing, resulting in the breach of confidential data, starting from PII, dates of birth, home addresses, e-mail addresses, credit card numbers, social security numbers, etc.
According to pcicomplianceguide.org, the Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards…Read more
Health-related data is moving more and more from paper to electronic records, determining changes in how healthcare organizations or other industries processing healthcare records are managing and protecting their data today. Businesses that are involved in any way with the use or management of PHI (personal health information) of individuals, need to ensure that they secure their sensitive data against loss or leakage, by following security guidelines, like HIPAA, in order to avoid penalties.What is HIPAA
Health Insurance Portability and Accountability Act of 1996, HIPAA, provides data privacy and security measures for protecting medical information. The legislation is designed to protect the ePHI (electronic protected health information) of individuals, like Social Security Numbers, medical ID numbers, credit card numbers, drivers’ license numbers, home address,…Read more
The 2017 Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation, and leadership in information security. Winners are being chosen based on the strength of the nomination and the popular vote by the Information Security Community.
“Congratulations to CoSoSys for winning the Data Leakage Prevention category of the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence, and innovation in today’s cybersecurity industry.”
For us, it’s the 2nd year to participate in the DLP Solution of the Year category. We are proud that this year, and in 2016 as well, Endpoint Protector 4 …Read more
From a niche player, Apple succeeded to have a general-purpose enterprise use nowadays. Once best suited only for creative roles in design, photography or marketing, today Macs experience a growing adoption in enterprises as a result of a higher demand from all employees. One of the top reasons is the low total cost of ownership; an enterprise could save from $265 to $535 over a four-year period for each employee who uses a Mac over a PC. Apple knows that and their strategy reflects in every release and every product they launch.
Take the macOS Sierra, for example. Currently, its adoption has reached 38% among Mac users, while Windows 10 has less than 25%. When we look at the features that were released in September, we see two things – Apple’s desire to strengthen their market share by unifying users’ experience with all Apple products and their convenience and ease of …Read more
New beginnings are always exciting and bring a certain freshness and energy to start over, to reinvent ourselves and aim for higher achievements. For us, 2017 starts with great roadmaps and plans and with intensive preparations for the RSA Conference which we haven’t missed in the last 3 years.
Every year, a unique theme related to information security has been chosen for RSA, since 1995.
This year’s theme – Power of Opportunity – invites everyone to switch perspective from issue to opportunity, from problem to solution and encourages professional development, moving the industry forward and joining in a single community. “The RSA Conference opens the door and invites all inside to reimagine and reinvent what’s accepted, what’s expected and what’s possible, “says Linda Grey, director and general manager of RSA Conference.
For 2017, organizers added four more…Read more
With actual real-life successful implementations in many industries, we have to stop talking about the Internet of Things as an innovation of the future, a next generation technology. IoT is already here, it is changing our lives every day without even noticing and, in no time, we will not be able to imagine life without it. And if you are concerned that your refrigerator might know your dietary habits better than you, do not stress about it. Sooner or later you will come to peace with it.
Currently, Internet of Things (IoT) can be divided into five niche markets: smart cities, connected cars or smart transportation, smart homes, industrial internet, and wearables.
In the next few examples, we will see how IoT is currently used, what value it brings to many existing systems and how will it evolve, as well as what risks it presents.
One of the challenges IoT addresses is sustainable…Read more