All posts by author

Larisa Cocis
Larisa is a Marketing Specialist at CoSoSys with experience in PR, communications and event organizing. She is working on community building, Data Loss Prevention researches, content writing and social media. Her experience in diverse fields and organizations (NGOs and enterprises) and her passion for technology brings a fresh perspective on the IT security industry.


Join us at Infosecurity Europe 2017

May 25, 2017 Author: Events 0 Comments

The premier gathering of security leaders, Infosecurity Europe, delivers every year significant insights into the data security world through the exhibition area as well as the conference programs. The event is a great opportunity for IT security professionals and business managers to find inspiration for their data protection challenges in terms of approach and solutions to implement. Infosecurity Europe is the largest and most comprehensive conference program in the region, featuring over 360 exhibitors showcasing the most relevant information security solutions and products to 13,500 visitors.

We are exhibiting at Infosec Europe for several years now and we are looking forward to this year’s edition. The team will be ready to showcase our latest product update – Endpoint Protector 5 – with the updated eDiscovery module, the redesigned, responsive…

Read more

Sure Ways to Fail in Data Security

When it comes to data protection and regulatory compliance, most of the organizations are not taking into consideration all risk factors that could hinder the security process. The lack of awareness and preparation can lead businesses into failing to protect their company data and preventing data breaches that could cost them their reputation.

No BYOD Policies

According to a research study, uncontrolled user access to data and poor management of where data is stored are two of the biggest mistakes regarding a company’s data security.
Reaching compliance is already a complex process, but companies allowing their employees to transfer data inside and outside the network makes it even more difficult. No employee training or monitoring, along with no BYOD policies is a sure road to failure for any business.
The study shows that a lot of IT professionals (69%) allow employees to transfer…

Read more

PCI Compliance – Why It Is a Must

April 6, 2017 Author: Compliance 0 Comments

Financial institutions often deal with data breaches due to the huge value financial records hold for external attackers or malicious insiders. A data security incident in financial organizations can have multiple negative ramifications for both the organization and the owners of the leaked data.
Last year a series of data breaches occurred in the financial sector: Citizens Bank, Nationstar Mortgage, Central Bank of Russia, TD Bank, Bangladesh Bank, and many others. One of the major causes was the significant rise of phishing attacks, especially CEO spear phishing, resulting in the breach of confidential data, starting from PII, dates of birth, home addresses, e-mail addresses, credit card numbers, social security numbers, etc.

What is PCI DSS?

According to pcicomplianceguide.org, the Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards…

Read more

HIPAA Basics and The Role of DLP in Meeting Compliance

Health-related data is moving more and more from paper to electronic records, determining changes in how healthcare organizations or other industries processing healthcare records are managing and protecting their data today. Businesses that are involved in any way with the use or management of PHI (personal health information) of individuals, need to ensure that they secure their sensitive data against loss or leakage, by following security guidelines, like HIPAA, in order to avoid penalties.

What is HIPAA

Health Insurance Portability and Accountability Act of 1996, HIPAA, provides data privacy and security measures for protecting medical information. The legislation is designed to protect the ePHI (electronic protected health information) of individuals, like Social Security Numbers, medical ID numbers, credit card numbers, drivers’ license numbers, home address,…

Read more

Endpoint Protector 4 is Winner at the Cybersecurity Excellence Awards 2017

February 15, 2017 Author: Data Loss Prevention 1 Comment

The 2017 Cybersecurity Excellence Awards honor companies and individuals that demonstrate excellence, innovation, and leadership in information security. Winners are being chosen based on the strength of the nomination and the popular vote by the Information Security Community.

“Congratulations to CoSoSys for winning the Data Leakage Prevention category of the 2017 Cybersecurity Excellence Awards,” said Holger Schulze, founder of the Information Security Community on LinkedIn which organizes the awards program. “With over 450 entries, the 2017 awards are highly competitive. All winners and finalists reflect the very best in leadership, excellence, and innovation in today’s cybersecurity industry.”

For us, it’s the 2nd year to participate in the DLP Solution of the Year category. We are proud that this year, and in 2016 as well, Endpoint Protector 4 …

Read more

Macs in Enterprises Today and 5 Steps to Secure Their Data

From a niche player, Apple succeeded to have a general-purpose enterprise use nowadays. Once best suited only for creative roles in design, photography or marketing, today Macs experience a growing adoption in enterprises as a result of a higher demand from all employees. One of the top reasons is the low total cost of ownership; an enterprise could save from $265 to $535 over a four-year period for each employee who uses a Mac over a PC. Apple knows that and their strategy reflects in every release and every product they launch.

Take the macOS Sierra, for example. Currently, its adoption has reached 38% among Mac users, while Windows 10 has less than 25%. When we look at the features that were released in September, we see two things – Apple’s desire to strengthen their market share by unifying users’ experience with all Apple products and their convenience and ease of …

Read more

Meet Us at RSA Conference 2017 to Fully Explore DLP

January 4, 2017 Author: Events 0 Comments

New beginnings are always exciting and bring a certain freshness and energy to start over, to reinvent ourselves and aim for higher achievements. For us, 2017 starts with great roadmaps and plans and with intensive preparations for the RSA Conference which we haven’t missed in the last 3 years.

Every year, a unique theme related to information security has been chosen for RSA, since 1995.

This year’s theme – Power of Opportunity – invites everyone to switch perspective from issue to opportunity, from problem to solution and encourages professional development, moving the industry forward and joining in a single community. “The RSA Conference opens the door and invites all inside to reimagine and reinvent what’s accepted, what’s expected and what’s possible, “says Linda Grey, director and general manager of RSA Conference.

For 2017, organizers added four more…

Read more

IoT – Not a Matter of the Future Anymore!

December 15, 2016 Author: Other security topics 0 Comments

With actual real-life successful implementations in many industries, we have to stop talking about the Internet of Things as an innovation of the future, a next generation technology. IoT is already here, it is changing our lives every day without even noticing and, in no time, we will not be able to imagine life without it. And if you are concerned that your refrigerator might know your dietary habits better than you, do not stress about it. Sooner or later you will come to peace with it.
Currently, Internet of Things (IoT) can be divided into five niche markets: smart cities, connected cars or smart transportation, smart homes, industrial internet, and wearables.
In the next few examples, we will see how IoT is currently used, what value it brings to many existing systems and how will it evolve, as well as what risks it presents.

1. Smart cities

One of the challenges IoT addresses is sustainable…

Read more

8 Data Security Risks You Should Be Aware of on Black Friday

November 21, 2016 Author: Other security topics 0 Comments

Black Friday is that day of the year when consumerization is at its peak. Everybody is searching for bargains, many even take a day off and, in many US states, it has been declared a public holiday. That means something.

The shopping buzz has determined in the last few years an increase in cyber attacks due to poor data security knowledge, and more creative and sophisticated methods used by attackers.

With a high shopping fever syndrome, people will spend hours online on various e-commerce websites, to take full advantage of Black Friday and the weekend offers, but they will unwittingly put at risk their private data and their employer’s data security, because many people search for deals from the work computer, on the company network, or from home, where protection is weaker.

The number of phishing attacks, especially against payment systems and online stores will start to bloom with…

Read more

The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints

November 14, 2016 Author: Endpoint Protection 0 Comments

When it comes to data security risks, every industry has its own specifics, depending on the type of information it works with or it stores, depending on the technology it uses, etc. Consequences of data breaches, however, are pretty much the same, regardless the industry or business, and so are the errors they make with respect do data security and the users’ behavior when working with confidential data.

Data breaches or loss of critical information happen where and when least expected. In most of the cases, data breaches or data losses are caused incidentally by employees; protecting endpoints only from external threats, like malware, is not enough anymore. Insider threats have become more powerful, causing high-costly damages to the business, or even shutting it down. One of the leading causes is the fact that these days, employees are encouraged by companies to use a variety of…

Read more
12