Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be leaked, but will they become a bigger target due to their growing market share?
Some of the biggest data breaches episodes of the last few years, from Target Corp. to Home Depot., share a common thread. Microsoft Corp. platforms were involved at some level. The most common explanation for the frequency of attacks on Microsoft platforms is that they are more or less everywhere, creating a bigger and more lucrative market opportunity for hackers.What companies are using Macs?
There are two types of companies that adopt Macs. First one, companies that have Macs here and there, 3-5 in the Marketing department, 2-3 for top management and there are companies like Google who manage over 40000 Macs. Another example is Cisco where…Read more
Recently we conducted a research on our customers to have a more clear idea on the employees’ behavior in relation to company data and we have made some interesting discoveries.1. Pretty much all employees have access to confidential data and the majority of them don’t even know it
7 out of 10 employees work with financial information, Personal Identifiable Information, marketing plans, customer databases, you name it. To prevent data breaches, a significant number of businesses rely solely on the confidentiality agreement that people sign when they get hired. But they do not realize that those agreements do not guarantee that people will not disclose confidential data by negligence. If 6 out of 10 people are not aware which files are confidential and which are not, you can imagine that they wouldn’t have a problem copying a contract to their personal e-mail address to finish …Read more
In April, we are exhibiting at RSA Conference in San Francisco. With all the preparation for the show, I cannot help but wonder why there is so much fuss around this type of events and I thought of several reasons that may be less obvious. I mean, not the usual ‘stay up to date with the latest trends and the opportunity to network’ ones.1. For CSOs, CISOs, etc. – personal branding
Marketing speech is not so common among IT security professionals, but that doesn’t mean they shouldn’t apply some of the concepts. Self-branding is about taking the necessary steps to ensure that you are perceived by the people around exactly how you want to be seen – e.g. an expert in your field and that more and more people know you. Basically, you enhance your image or create a certain image for your audience (e.g. potential employers). Chief Security Officers have the opportunity to attend at RSA …Read more
Welcome, everyone, to Endpoint Protector Blog. We are excited to launch this new platform where we can split hairs and talk about Data Loss Prevention, Data Security, Mobile Device Management and other topics we may find interesting along the way.A few words about CoSoSys, vendor of Endpoint Protector
We are exploring the tangled world of data security since 2004, when threats weren’t so various and sophisticated as they are nowadays. We are based in Cluj-Napoca, in the beautiful and mysterious Transylvania and our products reach businesses all over the world.
Our mission is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability and communications solutions, without compromising security. To achieve this, we develop solutions that prevent data loss on the ever-increasing number of devices, endpoints…Read more