With every release and version of OS X, iOS and, of course, new devices and computers, Apple is driving more and more adoption. It’s the company that manages to increase customers’ loyalty and to gain new ones with the speed of light.
In June, I attended WWDC 2015 and just like all their events, it was totally worth it.Features and enhancements beneficial for both personal and business use
Among the announcements, there was OS X El Capitan and iOS 9 which are scheduled to be released in the fall. Apple’s challenge now is to overcome their own record with El Capitan- the fastest adoption rate for any PC operating system ever – 55% recorded by Yosemite-. From the features included in this new OS version, it seems that they’re on the right track. As we are used to, Apple’s bidding on convenience, user experience and performance. Attention to detail and refinement are pushed to extremes,…Read more
Since Data Loss Prevention technology has been developed, there are some questions that always pop-up in the mind of customers, analysts, journalists, etc.:
- How do we measure the Return of Investment?
- How do we know that our DLP is efficient?
These are perfectly justified questions and we thought of some metrics that could help determine whether DLP is worth the investment.
First of all, Data Loss Prevention purpose is to prevent breaches from happening. Depending on each vendor’s solution, the IT Admin has the option to either block the transfer of confidential data through different channels and have all attempts recorded, or allow it, but have all transfers reported. So, measuring the success of a DLP solution depends also on how the company uses it.
In the first situation, the number of attempts and their severity would be a good metric to realize if the tool is efficient or not.…Read more
There are several documents like white papers, Data Loss Prevention Best Practices and deployment guides out there. Although they provide valuable information on how to approach, select and implement a DLP solution, they are mainly useful for medium and large companies. The reason for this is sort of simple: usually, it is said that a company has to reach a certain maturity before it starts to look at data security. So what about companies that are just getting started? Do they need DLP?
In today’s business environment where the biggest accommodation provider owns no real estate and the biggest taxi company owns no vehicles, ideas and data are certainly the most valuable assets.What’s the starting point regarding data security?
Before a company is even born, there is one (or a few) people that have a good idea and want to make it a reality. As individuals, we are all exposed to the latest…Read more
Depending on your specific industry and geographic location, there are several rules and regulations on data protection your company has to comply with. This is nothing new, as PCI, SOX, GBLA, PIPED, Basel II or HIPAA compliance have been around for some time. The Data Protection Directive (aka Directive 95/46/EC) is also nothing new as it was adopted by the European Union in 1995. Unlike a Directive that needs national legislation to implement, a Regulation will span across all EU member states. It applies to small and medium companies just like it does for multinationals. It also applies to any company that has information about any European citizen so anybody that is doing business within the EU will have to comply with it.
Let’s take a look at some of the other changes the upcoming regulation will bring and find out why we shouldn’t fear it.A lot has changed since 1995 so why not the…Read more
Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be leaked, but will they become a bigger target due to their growing market share?
Some of the biggest data breaches episodes of the last few years, from Target Corp. to Home Depot., share a common thread. Microsoft Corp. platforms were involved at some level. The most common explanation for the frequency of attacks on Microsoft platforms is that they are more or less everywhere, creating a bigger and more lucrative market opportunity for hackers.What companies are using Macs?
There are two types of companies that adopt Macs. First one, companies that have Macs here and there, 3-5 in the Marketing department, 2-3 for top management and there are companies like Google who manage over 40000 Macs. Another example is Cisco where…Read more
Recently we conducted a research on our customers to have a more clear idea on the employees’ behavior in relation to company data and we have made some interesting discoveries.1. Pretty much all employees have access to confidential data and the majority of them don’t even know it
7 out of 10 employees work with financial information, Personal Identifiable Information, marketing plans, customer databases, you name it. To prevent data breaches, a significant number of businesses rely solely on the confidentiality agreement that people sign when they get hired. But they do not realize that those agreements do not guarantee that people will not disclose confidential data by negligence. If 6 out of 10 people are not aware which files are confidential and which are not, you can imagine that they wouldn’t have a problem copying a contract to their personal e-mail address to finish …Read more
In April, we are exhibiting at RSA Conference in San Francisco. With all the preparation for the show, I cannot help but wonder why there is so much fuss around this type of events and I thought of several reasons that may be less obvious. I mean, not the usual ‘stay up to date with the latest trends and the opportunity to network’ ones.1. For CSOs, CISOs, etc. – personal branding
Marketing speech is not so common among IT security professionals, but that doesn’t mean they shouldn’t apply some of the concepts. Self-branding is about taking the necessary steps to ensure that you are perceived by the people around exactly how you want to be seen – e.g. an expert in your field and that more and more people know you. Basically, you enhance your image or create a certain image for your audience (e.g. potential employers). Chief Security Officers have the opportunity to attend at RSA …Read more
Welcome, everyone, to Endpoint Protector Blog. We are excited to launch this new platform where we can split hairs and talk about Data Loss Prevention, Data Security, Mobile Device Management and other topics we may find interesting along the way.A few words about CoSoSys, vendor of Endpoint Protector
We are exploring the tangled world of data security since 2004, when threats weren’t so various and sophisticated as they are nowadays. We are based in Cluj-Napoca, in the beautiful and mysterious Transylvania and our products reach businesses all over the world.
Our mission is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability and communications solutions, without compromising security. To achieve this, we develop solutions that prevent data loss on the ever-increasing number of devices, endpoints…Read more