New beginnings are always exciting and bring a certain freshness and energy to start over, to reinvent ourselves and aim for higher achievements. For us, 2017 starts with great roadmaps and plans and with intensive preparations for the RSA Conference which we haven’t missed in the last 3 years.
Every year, a unique theme related to information security has been chosen for RSA, since 1995.
This year’s theme – Power of Opportunity – invites everyone to switch perspective from issue to opportunity, from problem to solution and encourages professional development, moving the industry forward and joining in a single community. “The RSA Conference opens the door and invites all inside to reimagine and reinvent what’s accepted, what’s expected and what’s possible, “says Linda Grey, director and general manager of RSA Conference.
For 2017, organizers added four more…Read more
Here we are, at the end of another great year for the cybersecurity world. Along the year, we’ve witnessed some unpredictable events, but also the evolution of data loss prevention.
No one can argue that Data Loss Prevention (DLP) as a concept and technology has come a long way since it emerged in 2006. Back then it disrupted the security industry with the capabilities of identifying and blocking sensitive data from leaving the company, which no other solution could have done. It was a great innovation also due to USB control features that stopped employees from copying sensitive data to USB devices, strengthening companies’ data security. Since 2006, the DLP adoption increased exponentially and now, there is no IT security professional that hasn’t heard about this great IT security tool.
But let’s get back to the year 2016. It is a perfect moment of the year to look back and see …Read more
With actual real-life successful implementations in many industries, we have to stop talking about the Internet of Things as an innovation of the future, a next generation technology. IoT is already here, it is changing our lives every day without even noticing and, in no time, we will not be able to imagine life without it. And if you are concerned that your refrigerator might know your dietary habits better than you, do not stress about it. Sooner or later you will come to peace with it.
Currently, Internet of Things (IoT) can be divided into five niche markets: smart cities, connected cars or smart transportation, smart homes, industrial internet, and wearables.
In the next few examples, we will see how IoT is currently used, what value it brings to many existing systems and how will it evolve, as well as what risks it presents.
One of the challenges IoT addresses is sustainable…Read more
Black Friday is that day of the year when consumerization is at its peak. Everybody is searching for bargains, many even take a day off and, in many US states, it has been declared a public holiday. That means something.
The shopping buzz has determined in the last few years an increase in cyber attacks due to poor data security knowledge, and more creative and sophisticated methods used by attackers.
With a high shopping fever syndrome, people will spend hours online on various e-commerce websites, to take full advantage of Black Friday and the weekend offers, but they will unwittingly put at risk their private data and their employer’s data security, because many people search for deals from the work computer, on the company network, or from home, where protection is weaker.
The number of phishing attacks, especially against payment systems and online stores will start to bloom with…Read more
When it comes to data security risks, every industry has its own specifics, depending on the type of information it works with or it stores, depending on the technology it uses, etc. Consequences of data breaches, however, are pretty much the same, regardless the industry or business, and so are the errors they make with respect do data security and the users’ behavior when working with confidential data.
Data breaches or loss of critical information happen where and when least expected. In most of the cases, data breaches or data losses are caused incidentally by employees; protecting endpoints only from external threats, like malware, is not enough anymore. Insider threats have become more powerful, causing high-costly damages to the business, or even shutting it down. One of the leading causes is the fact that these days, employees are encouraged by companies to use a variety of…Read more
Last month, our company had the privilege to attend three of the most important IT Security events worldwide: GITEX Tech Week in Dubai, IT-SA in Nuremberg, and Tech Trade Live in Dublin.
All three events were a major success, giving us the opportunity to feel the market and interact with both existing and new clients or partners, and to receive a lot of feedback and appreciation for our work. We want to thank our dedicated partners, emt Distribution, BiRoNet, and Reinnasance, who helped us take full advantage of these events.
This year’s 36th GITEX Technology Week, in Dubai, was the main IT Security event with the biggest impact from all of the three events we attended last month. GITEX 2016 is the largest technology exchange and marketplace for the Middle East & Africa. The event gathered over 140,000 technology professionals, entrepreneurs, public sector officials, enterprise…Read more
Every industry has its own particularities when it comes to data security risks, depending on the type of information being stored and processed, as well as on how many people have access to this information and the technologies that use it. For healthcare, patient medical records are what make the headlines when an organization is breached, and for financial organizations, bank accounts details are chased by attackers. For law firms, the trade secrets, patents, copyright details and attorney-client privileged communications are the most vulnerable. None of these industries is immune to external attacks or to insider threats. Moreover, data breaches usually occur where they are least expected because attackers have more sophisticated methods, often getting to the primary target by obtaining a set of data from other companies.
Privacy and confidentiality are essential values…Read more
In October, our team members will take their comfy shoes for exhibitions and take part at three major events in Europe and Asia. They are prepared to welcome you in Dubai, at Gitex, in Nuremberg at it-sa and in Dublin, at Tech Trade Live.
We invite you to stop by our booths and make the best of our presence at each event – live demos, Q&As, live presentations, one-on-one meetings, etc. If you have a specific Data Loss Prevention, MDM, USB encryption, Device Control request or doubt, we will be there to clarify it and guide you through the preliminary steps to implement this type of solutions.
You can find below more details about the events.1. Discover the award-winning Endpoint Protector DLP at Gitex 2016
Find us at the emt Distribution Booth C2-10 Hall 2, 16-20 October, Dubai World Trade Center.
GITEX is one of the biggest events where innovation in technology is revealed. The organizers…Read more
Not long ago we released the revamped USB Enforced Encryption from Endpoint Protector 4 DLP which has been implemented successfully by many of our customers. We received great feedback, so we want to share more details about this solution with you.What is Enforced Encryption?
For some time now, Enforced Encryption has become a best practice for security in case of USB devices, e-mail, internal HDDs, communications protocols, etc. Currently, we provide Enforced Encryption for USB devices allowing organizations to remotely deploy EasyLock, USB encryption software through Endpoint Protector 4 and thus forcing users to use only encrypted devices while transferring data. Instead of denying access to these devices, which would be unpractical, with the USB Enforced Encryption you protect data in case USB drives are lost or stolen.
Enforced Encryption is used for two strong reasons:…Read more
Have you ever found a USB stick in a random location or received one in the letterbox? Just stop for a few seconds before plugging it into your computer and remember that curiosity killed the cat and your computer doesn’t have to suffer the same fate.
Recent cases of receiving random USB sticks in letterboxes in Australia draw our attention. The Australian police are warning the citizens that cyber-criminals are sending unmarked USB drives to residential letterboxes. Suspicions are that the USB devices may contain malware or ransomware that could destroy the computer and so far what has been confirmed is the fact that victims have experienced fraudulent media streaming, according to Victoria Police. There are no further details about the extent of this and if any private individual data has been disclosed. Usually the purpose of this kind of attacks is to get confidential data or financial…Read more