Find out what’s new in Endpoint Protector v5.8
v5.8 of Endpoint Protector by CoSoSys is now available and adds a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches.
Critical…
Game On – Tackling the threat of a data breach in professional sports
What’s the first industry that comes to mind when you think about data security and the risks of a data breach? The banking sector? Perhaps healthcare?
But what about professional sports organizations?
From player performance…
NIST 800-171 Compliance Guide
How federal government contractors can achieve NIST 800-171, Revision 2, compliance with Endpoint Protector for data loss prevention and USB device control. NIST has produced more than 200 special publications covering…
DLP in the German Healthcare SystemÂ
In the German healthcare industry, sensitive data spans everything from drug patents through to patient data and clinical trial results. That’s why data breaches can lead to financial losses and damage a company’s…
What is intellectual property? Understanding IP rights, negligence & more
Intellectual property (IP) means creations of the human mind, such as artistic work and inventions. However, this term refers not just to the creations of individuals but also to intangible assets owned by commercial entities,…
How to Prevent Data Breaches in 2023
The key to preventing data breaches in the current cybersecurity landscape is understanding exactly how they happen and covering your entire attack surface. Let us guide you through the anatomy of data loss and show you specific…
Key DLP market trends and drivers for 2023 and beyond
With 2023 just around the corner, one may wonder what effect the next years will have on the DLP market, DLP solution development directions, and the requirements for data loss prevention. We certainly think about that a lot,…
5 Things to Consider for an Insider Threat Audit
In today’s world of information technology, insider threats are one of the primary reasons for security breaches. The definition of insider threat includes not just intentional malicious actions but also accidents and…
How DLP Helps Financial Institutions Protect Their Data
In the financial sector, data is not just a resource from which companies extract useful business insights. Financial institutions create, gather, process, and store large volumes of sensitive information. This sensitive…
How to secure healthcare data with a DLP solution
Considered highly sensitive and very valuable, protected health information (PHI) has been heavily regulated for years through specialized laws such as the Health Insurance Portability and Accountability Act (HIPAA).…
5 Data Security Measures Software Companies Need to Take
Software companies are at the forefront of digital innovation. New products can revolutionize the way businesses operate and create more efficient or creative ways in which people interact with data and each other. With…
Endpoint Protector by CoSoSys Announces Same-Day Support for Apple’s macOS Ventura
Endpoint Protector by CoSoSys continues its commitment to same-day support for the latest macOS versions with full support for macOS Ventura.
First announced at WWDC 2022, macOS Ventura is a significant update that introduces…
Cybersecurity Awareness Month: What To Consider
Cyber attacks continue to target businesses of all sizes, with potential threats to customers’ personal data and even the functionality of critical infrastructure services. Cybersecurity awareness month provides an…
CPRA: Overviewing Its Changes and Getting Ready for Compliance
Data protection laws always come with the potential for amendments to change those laws in light of both prevailing cybersecurity risks and the perception of consumer privacy rights not being fully protected. In California,…
Slack security concerns and how DLP helps overcome them
In recent years, Slack became a de facto standard platform for business communications within business teams. Originally, it was a cloud service designed primarily for developers and IT personnel. However, now it is often…
Endpoint Protector by CoSoSys Ranked #1 for DLP Configuration
We’re delighted to announce that Endpoint Protector has been rated #1 for Data Loss Prevention Configuration in the G2’s Fall 2022 Reports, earning a total of over five badges across various categories.
Leader
Momentum…
Is there a disconnect between business leaders and security teams?
Just a decade or two ago, cybersecurity used to be a concern only for the most prominent market players. Today, in the age of digital transformation, everyone is on their toes, even the smallest businesses.
Handling cybersecurity…
Pharma Companies: How to Protect Your Intellectual Property?
Pharmaceutical intellectual property is a prime target for cybercriminals, nation-state actors, and malicious insiders due to its high commercial and strategic value. Protecting pharma IP requires discovering and…
5 Recommendations for User Data Protection and Data Privacy
Protecting user data requires focusing on internal risks as much as external attacks. Limit access rights, monitor all data channels, and identify sensitive information wherever it resides. Enforce encryption across…
Video Depositions: Data Security and Attorney-Client Privilege Concerns
Video depositions are not new. Attorneys have been using them for years to conduct discovery for court cases. They have proven useful when witnesses are unable to appear in court or to pinpoint inconsistencies in testimonies.…
Automotive cyber security standards: ISO/SAE 21434 and more
The automotive industry is one of the victims of the extremely rapid onset of the digital age. For a few decades, the car computer was just a fancy name for a very simple electronic control unit (ECU) monitoring the engine. The…
Find out what’s new in Endpoint Protector v5.6
CoSoSys today launches v5.6 of its Endpoint Protector solution, adding a host of new features to help organizations better protect their sensitive data from insider threats, accidental loss, and compliance breaches.…
How DLP Helps Protect Financial Information
Due to the massive amounts of personally identifiable information (PII) and credit card data they collect, financial institutions such as banks and investment services are some of the most attractive targets for cybercriminals.…