IoT – Not a Matter of the Future Anymore!

December 15, 2016 Author: Other security topics 0 Comments

With actual real-life successful implementations in many industries, we have to stop talking about the Internet of Things as an innovation of the future, a next generation technology. IoT is already here, it is changing our lives every day without even noticing and, in no time, we will not be able to imagine life without it. And if you are concerned that your refrigerator might know your dietary habits better than you, do not stress about it. Sooner or later you will come to peace with it.
Currently, Internet of Things (IoT) can be divided into five niche markets: smart cities, connected cars or smart transportation, smart homes, industrial internet, and wearables.
In the next few examples, we will see how IoT is currently used, what value it brings to many existing systems and how will it evolve, as well as what risks it presents.

1. Smart cities

One of the challenges IoT addresses is sustainable…

Read more

8 Data Security Risks You Should Be Aware of on Black Friday

November 21, 2016 Author: Other security topics 0 Comments

Black Friday is that day of the year when consumerization is at its peak. Everybody is searching for bargains, many even take a day off and, in many US states, it has been declared a public holiday. That means something.

The shopping buzz has determined in the last few years an increase in cyber attacks due to poor data security knowledge, and more creative and sophisticated methods used by attackers.

With a high shopping fever syndrome, people will spend hours online on various e-commerce websites, to take full advantage of Black Friday and the weekend offers, but they will unwittingly put at risk their private data and their employer’s data security, because many people search for deals from the work computer, on the company network, or from home, where protection is weaker.

The number of phishing attacks, especially against payment systems and online stores will start to bloom with…

Read more

The 4 Biggest Mistakes Businesses Make Trying To Secure Endpoints

November 14, 2016 Author: Endpoint Protection 0 Comments

When it comes to data security risks, every industry has its own specifics, depending on the type of information it works with or it stores, depending on the technology it uses, etc. Consequences of data breaches, however, are pretty much the same, regardless the industry or business, and so are the errors they make with respect do data security and the users’ behavior when working with confidential data.

Data breaches or loss of critical information happen where and when least expected. In most of the cases, data breaches or data losses are caused incidentally by employees; protecting endpoints only from external threats, like malware, is not enough anymore. Insider threats have become more powerful, causing high-costly damages to the business, or even shutting it down. One of the leading causes is the fact that these days, employees are encouraged by companies to use a variety of…

Read more

GITEX, IT-SA, and Tech Trade Live. Impressions from 3 of the most important IT Security events in 2016

November 4, 2016 Author: Events 0 Comments

Last month, our company had the privilege to attend three of the most important IT Security events worldwide: GITEX Tech Week in Dubai, IT-SA in Nuremberg, and Tech Trade Live in Dublin.
All three events were a major success, giving us the opportunity to feel the market and interact with both existing and new clients or partners, and to receive a lot of feedback and appreciation for our work. We want to thank our dedicated partners, emt Distribution, BiRoNet, and Reinnasance, who helped us take full advantage of these events.

This year’s 36th GITEX Technology Week, in Dubai, was the main IT Security event with the biggest impact from all of the three events we attended last month. GITEX 2016 is the largest technology exchange and marketplace for the Middle East & Africa. The event gathered over 140,000 technology professionals, entrepreneurs, public sector officials, enterprise…

Read more

The Data Security Threats that Prevail in Law Firms

October 21, 2016 Author: Data Loss Prevention 0 Comments

Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies that use it. For healthcare, patient medical records are what make the headlines when an organization is breached, and for financial organizations, bank accounts details are chased by attackers. For law firms, the trade secrets, patents, copyright details and attorney-client privileged communications are the most vulnerable. None of these industries is immune to external attacks or to insider threats. Moreover, data breaches usually occur where they are least expected because attackers have more sophisticated methods, often getting to the primary target by obtaining a set of data from other companies.

Privacy and confidentiality are essential values…

Read more

Endpoint Protector at 3 IT security events this fall

October 3, 2016 Author: Events 0 Comments

In October, our team members will take their comfy shoes for exhibitions and take part at three major events in Europe and Asia. They are prepared to welcome you in Dubai, at Gitex, in Nuremberg at it-sa and in Dublin, at Tech Trade Live.

We invite you to stop by our booths and make the best of our presence at each event – live demos, Q&As, live presentations, one-on-one meetings, etc. If you have a specific Data Loss Prevention, MDM, USB encryption, Device Control request or doubt, we will be there to clarify it and guide you through the preliminary steps to implement this type of solutions.

You can find below more details about the events.

1. Discover the award-winning Endpoint Protector DLP at Gitex 2016

Find us at the emt Distribution Booth C2-10 Hall 2, 16-20 October, Dubai World Trade Center.

GITEX is one of the biggest events where innovation in technology is revealed. The organizers…

Read more

Extending your InfoSec policies with EasyLock Enforced Encryption

September 29, 2016 Author: Encryption 0 Comments

Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about this solution with you.

What is Enforced Encryption?

For some time now, Enforced Encryption has become a best practice for security in case of USB devices, e-mail, internal HDDs, communications protocols, etc. Currently, we provide Enforced Encryption for USB devices allowing organizations to remotely deploy EasyLock, USB encryption software through Endpoint Protector 4 and thus forcing users to use only encrypted devices while transferring data. Instead of denying access to these devices, which would be unpractical, with the USB Enforced Encryption you protect data in case USB drives are lost or stolen.

Enforced Encryption is used for two strong reasons:…

Read more

The unknown danger of USB sticks in letterboxes

September 22, 2016 Author: Device Control 0 Comments

Have you ever found a USB stick in a random location or received one in the letterbox? Just stop for a few seconds before plugging it into your computer and remember that curiosity killed the cat and your computer doesn’t have to suffer the same fate.

Recent cases of receiving random USB sticks in letterboxes in Australia draw our attention. The Australian police are warning the citizens that cyber-criminals are sending unmarked USB drives to residential letterboxes. Suspicions are that the USB devices may contain malware or ransomware that could destroy the computer and so far what has been confirmed is the fact that victims have experienced fraudulent media streaming, according to Victoria Police. There are no further details about the extent of this and if any private individual data has been disclosed. Usually the purpose of this kind of attacks is to get confidential data or financial…

Read more

The fascinating world of mobile devices and MDM

Since BYOD (bring-your-own-device) first emerged, there have been some significant changes in the tech and security industries. Companies and mobile devices manufacturers, as well as mobile operating systems developers, have been challenged to step up their game, especially with the constant innovations and security threats.

The incredible evolution of mobile devices technology

In 1983 the first mobile phone was manufactured and approved by the FCC (Federal Communications Commission) – Motorola DynaTAC 8000X (it offered 30 minutes of talk time) – and since then, the mobile devices industry has come a long way. Between 2007 and 2015 there were 1,423.9m units shipped worldwide to end users and for 2017 the number of mobile phone users is expected to reach 4.77 billion. That is more than half of the worldwide population. There are also estimated to be 19 million mobile app…

Read more

Are you GDPR compliant yet?

There is still time until 2018, but have you sketched a game plan yet? The General Data Protection (GDPR) regulation makes a big statement about individuals’ private data and their right to request data controllers and processors to delete, correct, and forward their data. In consequence, GDPR comes with significant changes compared to the Data Protection Directive 95/46/EC involving operational changes in organizations. So, if you haven’t started to prepare for the new regulation, you better start today.

Let’s see how the game plan would look like in order to maximize your chances of getting to the finish line without spending too many resources.

1. Make sure key people are aware of the changes

Chief Security Officers, IT Managers, CEOs, business unit managers, etc. have to be informed of the legal changes the GDPR imposes and should make sure they translate them into plain,…

Read more