When to start thinking about Data Loss Prevention

There are several documents like white papers, Data Loss Prevention Best Practices and deployment guides out there. Although they provide valuable information on how to approach, select and implement a DLP solution, they are mainly useful for medium and large companies. The reason for this is sort of simple: usually, it is said that a company has to reach a certain maturity before it starts to look at data security. So what about companies that are just getting started? Do they need DLP?

In today’s business environment where the biggest accommodation provider owns no real estate and the biggest taxi company owns no vehicles, ideas and data are certainly the most valuable assets.

What’s the starting point regarding data security?

Before a company is even born, there is one (or a few) people that have a good idea and want to make it a reality. As individuals, we are all exposed to the latest…

Read more

The upcoming EU Data Protection Regulation

Depending on your specific industry and geographic location, there are several rules and regulations on data protection your company has to comply with. This is nothing new, as PCI, SOX, GBLA, PIPED, Basel II or HIPAA compliance have been around for some time. The Data Protection Directive (aka Directive 95/46/EC) is also nothing new as it was adopted by the European Union in 1995. Unlike a Directive that needs national legislation to implement, a Regulation will span across all EU member states. It applies to small and medium companies just like it does for multinationals. It also applies to any company that has information about any European citizen so anybody that is doing business within the EU will have to comply with it.

Let’s take a look at some of the other changes the upcoming regulation will bring and find out why we shouldn’t fear it.

A lot has changed since 1995 so why not the…Read more

The Importance of Data Loss Prevention for Macs

Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be leaked, but will they become a bigger target due to their growing market share?

Some of the biggest data breaches episodes of the last few years, from Target Corp. to Home Depot., share a common thread. Microsoft Corp. platforms were involved at some level. The most common explanation for the frequency of attacks on Microsoft platforms is that they are more or less everywhere, creating a bigger and more lucrative market opportunity for hackers.

What companies are using Macs?

There are two types of companies that adopt Macs. First one, companies that have Macs here and there, 3-5 in the Marketing department, 2-3 for top management and there are companies like Google who manage over 40000 Macs. Another example is Cisco where…

Read more

CoSoSys Research on Insiders Threats

Recently we conducted a research on our customers to have a more clear idea on the employees’ behavior in relation to company data and we have made some interesting discoveries.

1. Pretty much all employees have access to confidential data and the majority of them don’t even know it

7 out of 10 employees work with financial information, Personal Identifiable Information, marketing plans, customer databases, you name it. To prevent data breaches, a significant number of businesses rely solely on the confidentiality agreement that people sign when they get hired. But they do not realize that those agreements do not guarantee that people will not disclose confidential data by negligence. If 6 out of 10 people are not aware which files are confidential and which are not, you can imagine that they wouldn’t have a problem copying a contract to their personal e-mail address to finish …

Read more

Why so much fuss around data security conferences

In April, we are exhibiting at RSA Conference in San Francisco. With all the preparation for the show, I cannot help but wonder why there is so much fuss around this type of events and I thought of several reasons that may be less obvious. I mean, not the usual ‘stay up to date with the latest trends and the opportunity to network’ ones.

1. For CSOs, CISOs, etc. – personal branding

Marketing speech is not so common among IT security professionals, but that doesn’t mean they shouldn’t apply some of the concepts. Self-branding is about taking the necessary steps to ensure that you are perceived by the people around exactly how you want to be seen – e.g. an expert in your field and that more and more people know you. Basically, you enhance your image or create a certain image for your audience (e.g. potential employers). Chief Security Officers have the opportunity to attend at RSA …

Read more

Welcome to Endpoint Protector Blog

Welcome, everyone, to Endpoint Protector Blog. We are excited to launch this new platform where we can split hairs and talk about Data Loss Prevention, Data Security, Mobile Device Management and other topics we may find interesting along the way.

A few words about CoSoSys, vendor of Endpoint Protector

We are exploring the tangled world of data security since 2004, when threats weren’t so various and sophisticated as they are nowadays. We are based in Cluj-Napoca, in the beautiful and mysterious Transylvania and our products reach businesses all over the world. 

Our mission is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability and communications solutions, without compromising security. To achieve this, we develop solutions that prevent data loss on the ever-increasing number of devices, endpoints

Read more