Happy Data Privacy Day

January 26, 2016 Author: Data Loss Prevention 0 Comments

As we’re getting ready to circle the 28th of January on the calendar, it’s time to take a second and wish everybody Happy Data Privacy Day! If you’re from a European country, then we meant Happy Data Protection Day!

What is Data Privacy Day?

Data Privacy Day is an international holiday created in 2007 that takes place every 28th of January. Initiated by the Council of Europe, the Data Privacy & Protection Day it is recognized by 47 European states, USA and Canada and its purpose is to raise awareness and promote privacy and data protection best practices. With the ever increasing data breaches occurring worldwide and numerous privacy and data security scandals, multiple global organizations have embraced Data Privacy Day.

Why should I care?

It’s not just about corporate data, leaked surveillance documents, celebrity naked pictures, personal bank details and social media…

Read more

Frequently asked questions about Data Loss Prevention

In our encounters and conversations with IT Administrators, IT Managers and data security staff, there are always some questions that pop-up. Some of them are valid concerns or doubts while others are signs of confusion, most of them being fed by vendors’ different approaches to DLP.

Here are 6 frequently asked questions about Data Loss Prevention (DLP):

1. Can I detect malware with DLP?

No. Data Loss Prevention is a technology that prevents data breaches and detects confidential data being transferred, used or stored on endpoints based on specific detection techniques, like data matching, rule and regular expression matching, keywords, etc. Dedicated DLP solutions focus on insider threats, while antivirus solutions, on outsider threats. However, there are antivirus solutions that provide light DLP capabilities, like blocking data transfers to e-mail.

2. Can I block the…Read more

The everlasting security solution – Encryption

January 8, 2016 Author: Encryption 0 Comments

Recently, I’ve had the pleasure to meet the creator of Pretty Good Privacy (PGP) and pioneer in cryptography, Phil Zimmermann. For all data security experts and vendors, he is an inspiration, especially because his e-mail encryption software became the most widely used in the world, even though he was persecuted by the government, he didn’t have any investors or at least paid staff. It is proof that great products do not need millions of dollars for marketing or large sales teams.

Me and Phil Zimmermann

It is interesting how data security evolved since 1991 and how dynamic the industry is today. With new technologies that have emerged, and reinterpretation of the old ones, our choices have become more difficult. E-mail encryption is still widely being used successfully. Unfortunately, not only e-mails have to be encrypted to secure data and prevent data breaches. There is a variety…

Read more

Good bye 2015, here comes 2016!

December 23, 2015 Author: Data Loss Prevention 0 Comments

I understand why at the end of the year everybody feels the need to look back, to review company’s results and actions, establish next year’s goals, and leave everything in order as you step in a new beginning. It is a great way of keeping track of progress, but also to honor time passing by and allowing yourself / your employees’ to feel nostalgic and excited for what’s next.

We had an amazing year, with ups and downs, but mostly ups, with product updates, bigger team, awards, events, and accomplishments we are proud of.

Endpoint Protector 4, our flagship Data Loss Prevention (DLP), Device Control and Mobile Device Management (MDM) product has had 3 major updates. Features like integration with SIEM solutions, compatibility with Thin Clients, with Mac OS X El Capitan, many enhancements at the granularity level, with Blacklists, Whitelists, Thresholds, features to support enterprises…

Read more

Ensure Your Endpoint Protection System is Ready for 2016 with These Tips

Whether you work with a small or a large company, making sure a quality endpoint protection system is put in place definitely comes first on your to-do list. After all, if data security is not taken seriously, you can’t expect potential clients to take the company seriously. Plus, it will completely tarnish the reputation of the brand, since the general audience will have a hard time placing their trust in it.

Even if you think everything is in order, it’s important to keep in mind that IT security trends tend to shift quite often. This is why it’s vital to ensure your endpoint protection policies will be able to face whatever challenges 2016 will throw at it.
Here are some useful pointers we believe you need to keep in mind if you want to make sure everything is ready for the New Year. Some of them might seem common knowledge to you, but keep in mind that even the most common advice…

Read more

Which Supporting Technologies Go Hand in Hand with Data Loss Prevention?

November 6, 2015 Author: Data Loss Prevention 0 Comments

Today’s organizations hold extremely sensitive information in their workstations. From passwords to personal emails, financial records, customer databases, an external attacker, a malicious employee or even an innocent, but negligent employee, are able to leak sensitive data and condemn the organization to failure, if proper solutions are not implemented.

While DLP is crucial to prevent such incidents from happening and cannot be replaced, it can be used with other complementary technologies so that it will improve overall data security.

1. Encryption

By encrypting files or emails, you will make sure that they are protected from unwanted access. If you use encryption, all your confidential information will be safe even if you decide to move it to a different device.

For example, EasyLock is a cross-platform data encryption solution that is going to help you …

Read more

The coming of the eSIM

Future smartphones will come with a virtual SIM, meaning without a physical SIM card.

With the introduction of the iPad mini 2 in late 2014 Apple has already started to go in this direction. Since then, iPads in North America are still shipped with a real SIM card but it is not assigned to a carrier, allowing the user to select the carrier.

The next steps involve Apple and Samsung to remove the physical SIM card entirely and use only a virtual SIM (called also eSIM) that will allow them be the providers. Users will have a subscription with Apple, for example, for the cell / data service, instead of having directly with the carrier. Apple might even become a MVNO (meaning a mobile virtual network operator) relying on real carriers infrastructure. The process is similar to Apple Pay relying on Credit Card providers and their infrastructure – it will do the same with mobile carriers.

You might…

Read more

Before wearables thrive in enterprise, consider these cultural and security issues

Wearables are deemed personal devices – those we use to keep track of our fitness progress, stay on top of important notifications, help us sleep better, remind us to eat healthier, and so on. But there is more to wearable devices, as they become part of the BYOD family in the workplace, as well as finding their own niches in the enterprise.

The growing potential of wearables for use in the workplace is getting noticed, one early device being the Motorola WT4000 Wearable System that allows for simplified inventory tracking and on-demand access to product information. Since 2004, Tesco PLC has been utilizing such devices to help employees efficiently take inventory in their various warehouses.
According to recent reports, consumers are interested in owning wearables in exchange for rewards, such as lower insurance rates. Some corporations are tapping in this concept, including Target…

Read more

Why Data Security needs to reunite business, HR and IT at the table

At the core of any data security software purchase, there should be a data security strategy.The strategy should contain clear objectives, the methods to accomplish them, the tools to do so, an implementation phase, and, of course, evaluation of how the process is running. At the very beginning of strategy building, designated people for key roles should be established and everyone should know their responsibilities. This is the ideal situation, but it isn’t something we encountered too often.

The typical case involves the IT Manager or CSO who creates the strategy and is also the one to choose the software that will be implemented. The business manager approves the budget and the IT Administrator ends up managing several tools, each one dealing with a different vulnerability. Somewhere along the line, a disconnection intervenes and managers fail to reunite the key people and to…

Read more

Why opt for the cloud-based DLP and MDM solution

September 15, 2015 Author: Data Loss Prevention 0 Comments

Since we launched My Endpoint Protector, our cloud-based Data Loss Prevention (DLP) and Mobile Device Management (MDM) solution, we have noticed several things about organizations’ perspective towards using this type of tool in the cloud. The attitude towards using SaaS DLP solutions mainly depends on the region, company size, industry, compliance and the organizations’ objectives when it comes to protecting data.

Organizations from regions like USA and Western Europe are more open to implement DLP and MDM in the cloud, while those from CEE, APAC and LATAM prefer to have the on-premise solution. The main reason is compliance, since there are several data protection laws that require data security solutions to be implemented on-premise. Skepticism towards cloud data security solutions also plays an important role. However, companies that do implement SaaS, report…

Read more