All posts by author

Larisa Cocis
Larisa is a Marketing Specialist at CoSoSys with experience in PR, communications and event organizing. She is working on community building, Data Loss Prevention researches, content writing and social media. Her experience in diverse fields and organizations (NGOs and enterprises) and her passion for technology brings a fresh perspective on the IT security industry.


Endpoint Protector 4 is Winner at the Cybersecurity Excellence Awards 2017

February 15, 2017 Author: Data Loss Prevention 0 Comments

The 2017 Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation, and leadership in information security. Winners are being chosen based on the strength of the nomination and the popular vote by the Information Security Community.

“Congratulations to CoSoSys for winning the Data Leakage Prevention category of the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence, and innovation in today’s cybersecurity industry.”

For us, it’s the 2nd year to participate in the DLP Solution of the Year category. We are proud that this year, and in 2016 as well, Endpoint Protector 4 …

Read more

Macs in Enterprises Today and 5 Steps to Secure Their Data

From a niche player, Apple succeeded to have a general-purpose enterprise use nowadays. Once best suited only for creative roles in design, photography or marketing, today Macs experience a growing adoption in enterprises as a result of a higher demand from all employees. One of the top reasons is the low total cost of ownership; an enterprise could save from $265 to $535 over a four-year period for each employee who uses a Mac over a PC. Apple knows that and their strategy reflects in every release and every product they launch.

Take the macOS Sierra, for example. Currently, its adoption has reached 38% among Mac users, while Windows 10 has less than 25%. When we look at the features that were released in September, we see two things – Apple’s desire to strengthen their market share by unifying users’ experience with all Apple products and their convenience and ease of …

Read more

Meet Us at RSA Conference 2017 to Fully Explore DLP

January 4, 2017 Author: Events 0 Comments

New beginnings are always exciting and bring a certain freshness and energy to start over, to reinvent ourselves and aim for higher achievements. For us, 2017 starts with great roadmaps and plans and with intensive preparations for the RSA Conference which we haven’t missed in the last 3 years.

Every year, a unique theme related to information security has been chosen for RSA, since 1995.

This year’s theme – Power of Opportunity – invites everyone to switch perspective from issue to opportunity, from problem to solution and encourages professional development, moving the industry forward and joining in a single community. “The RSA Conference opens the door and invites all inside to reimagine and reinvent what’s accepted, what’s expected and what’s possible, “says Linda Grey, director and general manager of RSA Conference.

For 2017, organizers added four more…

Read more

IoT – Not a Matter of the Future Anymore!

December 15, 2016 Author: Other security topics 0 Comments

With actual real-life successful implementations in many industries, we have to stop talking about the Internet of Things as an innovation of the future, a next generation technology. IoT is already here, it is changing our lives every day without even noticing and, in no time, we will not be able to imagine life without it. And if you are concerned that your refrigerator might know your dietary habits better than you, do not stress about it. Sooner or later you will come to peace with it.
Currently, Internet of Things (IoT) can be divided into five niche markets: smart cities, connected cars or smart transportation, smart homes, industrial internet, and wearables.
In the next few examples, we will see how IoT is currently used, what value it brings to many existing systems and how will it evolve, as well as what risks it presents.

1. Smart cities

One of the challenges IoT addresses is sustainable…

Read more

8 Data Security Risks You Should Be Aware of on Black Friday

November 21, 2016 Author: Other security topics 0 Comments

Black Friday is that day of the year when consumerization is at its peak. Everybody is searching for bargains, many even take a day off and, in many US states, it has been declared a public holiday. That means something.

The shopping buzz has determined in the last few years an increase in cyber attacks due to poor data security knowledge, and more creative and sophisticated methods used by attackers.

With a high shopping fever syndrome, people will spend hours online on various e-commerce websites, to take full advantage of Black Friday and the weekend offers, but they will unwittingly put at risk their private data and their employer’s data security, because many people search for deals from the work computer, on the company network, or from home, where protection is weaker.

The number of phishing attacks, especially against payment systems and online stores will start to bloom with…

Read more

The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints

November 14, 2016 Author: Endpoint Protection 0 Comments

When it comes to data security risks, every industry has its own specifics, depending on the type of information it works with or it stores, depending on the technology it uses, etc. Consequences of data breaches, however, are pretty much the same, regardless the industry or business, and so are the errors they make with respect do data security and the users’ behavior when working with confidential data.

Data breaches or loss of critical information happen where and when least expected. In most of the cases, data breaches or data losses are caused incidentally by employees; protecting endpoints only from external threats, like malware, is not enough anymore. Insider threats have become more powerful, causing high-costly damages to the business, or even shutting it down. One of the leading causes is the fact that these days, employees are encouraged by companies to use a variety of…

Read more

GITEX, IT-SA, and Tech Trade Live. Impressions from 3 of the most important IT Security events in 2016

November 4, 2016 Author: Events 0 Comments

Last month, our company had the privilege to attend three of the most important IT Security events worldwide: GITEX Tech Week in Dubai, IT-SA in Nuremberg, and Tech Trade Live in Dublin.
All three events were a major success, giving us the opportunity to feel the market and interact with both existing and new clients or partners, and to receive a lot of feedback and appreciation for our work. We want to thank our dedicated partners, emt Distribution, BiRoNet, and Reinnasance, who helped us take full advantage of these events.

This year’s 36th GITEX Technology Week, in Dubai, was the main IT Security event with the biggest impact from all of the three events we attended last month. GITEX 2016 is the largest technology exchange and marketplace for the Middle East & Africa. The event gathered over 140,000 technology professionals, entrepreneurs, public sector officials, enterprise…

Read more

The Data Security Threats that Prevail in Law Firms

October 21, 2016 Author: Data Loss Prevention 0 Comments

Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies that use it. For healthcare, patient medical records are what make the headlines when an organization is breached, and for financial organizations, bank accounts details are chased by attackers. For law firms, the trade secrets, patents, copyright details and attorney-client privileged communications are the most vulnerable. None of these industries is immune to external attacks or to insider threats. Moreover, data breaches usually occur where they are least expected because attackers have more sophisticated methods, often getting to the primary target by obtaining a set of data from other companies.

Privacy and confidentiality are essential values…

Read more

Endpoint Protector at 3 IT security events this fall

October 3, 2016 Author: Events 0 Comments

In October, our team members will take their comfy shoes for exhibitions and take part at three major events in Europe and Asia. They are prepared to welcome you in Dubai, at Gitex, in Nuremberg at it-sa and in Dublin, at Tech Trade Live.

We invite you to stop by our booths and make the best of our presence at each event – live demos, Q&As, live presentations, one-on-one meetings, etc. If you have a specific Data Loss Prevention, MDM, USB encryption, Device Control request or doubt, we will be there to clarify it and guide you through the preliminary steps to implement this type of solutions.

You can find below more details about the events.

1. Discover the award-winning Endpoint Protector DLP at Gitex 2016

Find us at the emt Distribution Booth C2-10 Hall 2, 16-20 October, Dubai World Trade Center.

GITEX is one of the biggest events where innovation in technology is revealed. The organizers…

Read more

The unknown danger of USB sticks in letterboxes

September 22, 2016 Author: Device Control 0 Comments

Have you ever found a USB stick in a random location or received one in the letterbox? Just stop for a few seconds before plugging it into your computer and remember that curiosity killed the cat and your computer doesn’t have to suffer the same fate.

Recent cases of receiving random USB sticks in letterboxes in Australia draw our attention. The Australian police are warning the citizens that cyber-criminals are sending unmarked USB drives to residential letterboxes. Suspicions are that the USB devices may contain malware or ransomware that could destroy the computer and so far what has been confirmed is the fact that victims have experienced fraudulent media streaming, according to Victoria Police. There are no further details about the extent of this and if any private individual data has been disclosed. Usually the purpose of this kind of attacks is to get confidential data or financial…

Read more
12