All Data Loss Prevention related articles

Five Things You Should Do to Keep Your Data Secure

February 8, 2018 Author: Data Loss Prevention 0 Comments

The omnipresence of the internet, in all aspects of both our private and work lives, has digitized our existence and transformed it into sets of data, valuable to both companies and cybercriminals.  While when it comes to businesses, users often agree to share their data as part of a give and take, where services are customized based on their data for a better user experience, sensitive information is also often targeted by malicious individuals through various types of scams and cyberattacks.

It is therefore important that both companies and individuals understand some of the basic, but crucial practices that help keep data secure on the internet. Here are our top five picks:

1. Two-factor authentication

Most email providers and internet services now offer two-factor authentication, a way of adding an extra layer of security on top of traditional passwords. It implies the existence…

Read more

A Closer Look at Endpoint Protector 5.1

January 26, 2018 Author: Data Loss Prevention 0 Comments

Released in May 2017, Endpoint Protector 5 came with a modern intuitive user interface, significant backend enhancements as well as new features and a completely redesigned and improved eDiscovery module. The upgrade underlined our commitment to continuing to provide great Data Loss Prevention solutions that address today’s data security needs and concerns.

Since then, our development team has been working hard around the clock to boost existing features and add new ones based on user feedback and industry demands. Today, we are happy to introduce our very first update for the 5th version of our flagship product, Endpoint Protector 5.1.0.0. Let’s take a closer look at some of its highlights.

Time and Network based Device Control policies

From this point on, admins will have the option to enable time and network based access rights from Device Control. What this essentially …

Read more

How to Ensure Your Data Doesn’t Move on When Your Employees Do

January 11, 2018 Author: Data Loss Prevention 0 Comments

In today’s fast-moving world, highly skilled professionals are constantly looking for more attractive opportunities that will move their careers forward and, as a consequence, companies struggle to retain employees in the long term. Staying in one job for one’s entire life is no longer the primary objective and changing jobs every three to five years is encouraged by every career counselor. According to consulting firm Hay Group, the average employee turnover rate in North America, across all industries, is expected to reach 23% by this year.

What does this mean in the context of data security? In a survey conducted by Biscom, 1 in 4 respondents said they take data with them when they leave a company, 85% of them feeling it is not wrong to take with them materials they themselves helped create. Many of those surveyed admitted that appropriating company data was possible due to companies’…

Read more

Data Security Resolutions for the New Year

The beginning of the New Year is a time when many companies consider the most pressing issues they have to solve in the upcoming year. With 2017 turning out to be one of the most taxing years for data security in memory, 2018 will be the year when companies will have to fight back by building up better defenses against breaches and leaks. Whether out of their own concern or obligated by new legislations, businesses’ New Year resolutions should feature data protection at their core.

Here are our top picks for what companies should be focusing on when it comes to data loss prevention in the New Year:

1. Become GDPR compliant

This point should come as no surprise to any business dealing with customers located in Europe. The EU’s General Data Protection Regulation (GDPR) will come into full force on 25 May 2018 and companies that will not align its policies to the new legislation’s strict regulations…

Read more

Keeping Your Data Secure During the Holiday Season

December 7, 2017 Author: Data Loss Prevention 0 Comments

With the holiday season around the corner, many employees are taking extended holidays, some choosing to work remotely to enjoy longer stays with their families. This adds an extra layer of peril to data security as work laptops and devices head out of the safety of company networks and into the busy and often times dangerous world of international travel and public internet.

Some of the most common cases of data loss occur when employees are on the move, with devices forgotten or stolen from public places. Trust in insecure networks can also lead to potential breaches and company sensitive data winding up in the wrong hands.

As remote work becomes a staple of the modern work environment, it is however up to the company to step up and ensure that their employees both understand how to keep their data safe while working remotely, but also take measures to prevent incidents from occurring.

Here…

Read more

How to Unlock the Full Potential of your DLP Solution

November 23, 2017 Author: Data Loss Prevention 0 Comments

Nowadays, it seems not a day goes by without another high-profile data breach being announced. From Equifax and Uber to Forever 21, no company, no matter how big, seems safe from sensitive information leaks. The consequences for these breaches range from loss of profit and customer confidence to more serious charges of noncompliance with data protection regulations and hefty fines.

Data Loss Prevention (DLP) technologies were developed to tackle this increasing threat to the security of companies’ most sensitive information. Since their emergence, they have become an indispensable part of IT departments’ security framework, protecting against both insider and outsider threats and helping to maintain compliance with increasingly complex data protection regulations.

While Data Loss Prevention has become a household name in the world of information security and more…

Read more

Why the future of security is data-centric

Nowadays, you will be hard-pressed to find a company that does not understand the importance of digital security. With departments ranging from distribution and logistics to marketing, engineering and design all relying on digital tools to gather information and perform their tasks, data has never been produced in such large quantities and at such speed. Such amounts of information coupled with ubiquitous internet is a match made in hacker heaven and with new breaches made public every day, security has moved up on businesses’ priority list, becoming a top concern.

However, a traditional security strategy, usually aimed at in-house IT infrastructure that includes firewalls, antivirus software and access control, is no longer a guarantee against breaches. Technology has given the work environment a degree of never before seen dynamism and flexibility. This inevitably means…

Read more

Top 5 Ways DLP can help with GDPR compliance

The enforcement of the EU General Data Protection Regulation (GDPR) is less than ten months away and companies across the EU and international businesses with European customers are already taking steps to achieve compliance. While some are still bewildered by its legal jargon, many tech companies and news outlets have come to the rescue providing extensive guides and infographics to help businesses understand what GDPR is, what its requirements mean for everyday company operations and how they can get started on the road to compliance. We, at Endpoint Protector, have also put together a handy guide and an informational video about GDPR compliance.

In short, the GDPR is the most notable change in data privacy regulation in Europe in the last 20 years and its purpose is to protect EU citizens’ private data, solidifying their right to demand that data controllers and processors delete,…

Read more

Fighting Shadow IT with DLP

In its 2016 top 10 security predictions, Gartner warned that by 2020 shadow IT is likely to account for a third of successful attacks experienced by enterprises. A relatively new concept that has arisen in recent years as a consequence of mounting pressure on IT departments to deliver as well as outdated company policies, shadow IT has become an uneasy element most companies either knowingly tolerate or are unaware of.

What is Shadow IT?

Shadow IT refers to applications and digital solutions not expressly sanctioned by management, but widely used in certain departments or the entire company to minimize workloads, often for the sake of convenience or as communication and collaboration tools. Slack, Evernote, Google Docs, for example, can be in many cases considered shadow IT.

There are multiple factors that have led to the rise of shadow IT. One has been the introduction of BYOD and the…

Read more

Why Having Linux Will Not Save You from Data Loss

Linux has long been considered a safe operating system that, with its opensource, community built kernel, is less likely to be a mark for cybercriminals because attacking it can be a far more daunting task than going after other, bigger, more vulnerable targets. But with the rising popularity of Linux and its introduction into the business environment, its attractiveness to hackers has grown as the recent slew of cyberattacks aimed at it can attest. From the backdoored version of Linux Mint that users unwittingly downloaded in February 2016 to the Mirai trojan used in DDoS attacks on computers running Linux in August 2016 and the most recent Erebus Linux ransomware attack that infected South Korean servers in June 2017, Linux’s image as the most secure OS is slowly cracking. And while it has yet to come under the relentless wave of attacks other OS like Windows and Android (that also uses…

Read more