The Most Common Myths about Data Loss Prevention

When it comes to Data Loss Prevention (DLP), you can’t afford to take any shortcuts. Believing that there are situations that couldn’t happen to you and that certain things are better left to chance is a huge mistake. Technology is definitely a godsend in today’s fast-paced society, but it can also be our undoing if the proper security precautions are not taken.

So where would you need to start to ensure that no valuable information is leaked? Well, getting your facts right is the best thing to do because you won’t make any crucial mistakes if you know what you are doing. Here are some common misconceptions you shouldn’t pay heed to:

1. Data loss prevention is too overwhelming, especially for small companies

Many business owners fall into the trap of believing that going with a DLP system means their entire company needs to start focusing all their efforts…

Read more

Mobile Device Management – Not just for security

There is no doubt that a Mobile Device Management (some call it Enterprise Mobility Management) Solution can help any organization safeguard their mobile employees and help navigate the BYOD-related pitfalls. Besides increasing productivity for the workforce in the field, a Mobile Device Management solution makes things easier for the IT admins that have to manage the mobile device fleet. However, an MDM tool can do much more.

A wide range of opportunities with Kiosk Mode

Enabling Kiosk Mode on an Android device (our Endpoint Protector MDM does this very well for Samsung devices) doesn’t require an MDM solution. It does, however, become essential when it comes to taking full advantage of all the benefits and cost savings Kiosk enabled mobile devices can bring. Having a smartphone or tablet locked into a single or only a few applications can turn an affordable device into a dedicated…

Read more

Highlights at WWDC 2015 – OS X El Capitan and iOS 9

With every release and version of OS X, iOS and, of course, new devices and computers, Apple is driving more and more adoption. It’s the company that manages to increase customers’ loyalty and to gain new ones with the speed of light.

In June, I attended WWDC 2015 and just like all their events, it was totally worth it.

Features and enhancements beneficial for both personal and business use

Among the announcements, there was OS X El Capitan and iOS 9 which are scheduled to be released in the fall. Apple’s challenge now is to overcome their own record with El Capitan- the fastest adoption rate for any PC operating system ever – 55% recorded by Yosemite-. From the features included in this new OS version, it seems that they’re on the right track. As we are used to, Apple’s bidding on convenience, user experience and performance. Attention to detail and refinement are pushed to extremes,

Read more

How do you know your Data Loss Prevention solution is efficient?

Since Data Loss Prevention technology has been developed, there are some questions that always pop-up in the mind of customers, analysts, journalists, etc.:

  • How do we measure the Return of Investment?
  • How do we know that our DLP is efficient?

These are perfectly justified questions and we thought of some metrics that could help determine whether DLP is worth the investment.

First of all, Data Loss Prevention purpose is to prevent breaches from happening. Depending on each vendor’s solution, the IT Admin has the option to either block the transfer of confidential data through different channels and have all attempts recorded, or allow it, but have all transfers reported. So, measuring the success of a DLP solution depends also on how the company uses it.

In the first situation, the number of attempts and their severity would be a good metric to realize if the tool is efficient or not.

Read more

When to start thinking about Data Loss Prevention

There are several documents like white papers, Data Loss Prevention Best Practices and deployment guides out there. Although they provide valuable information on how to approach, select and implement a DLP solution, they are mainly useful for medium and large companies. The reason for this is sort of simple: usually, it is said that a company has to reach a certain maturity before it starts to look at data security. So what about companies that are just getting started? Do they need DLP?

In today’s business environment where the biggest accommodation provider owns no real estate and the biggest taxi company owns no vehicles, ideas and data are certainly the most valuable assets.

What’s the starting point regarding data security?

Before a company is even born, there is one (or a few) people that have a good idea and want to make it a reality. As individuals, we are all exposed to the latest…

Read more

The upcoming EU Data Protection Regulation

Depending on your specific industry and geographic location, there are several rules and regulations on data protection your company has to comply with. This is nothing new, as PCI, SOX, GBLA, PIPED, Basel II or HIPAA compliance have been around for some time. The Data Protection Directive (aka Directive 95/46/EC) is also nothing new as it was adopted by the European Union in 1995. Unlike a Directive that needs national legislation to implement, a Regulation will span across all EU member states. It applies to small and medium companies just like it does for multinationals. It also applies to any company that has information about any European citizen so anybody that is doing business within the EU will have to comply with it.

Let’s take a look at some of the other changes the upcoming regulation will bring and find out why we shouldn’t fear it.

A lot has changed since 1995 so why not the…Read more

The Importance of Data Loss Prevention for Macs

Apple products have increasingly gained popularity in enterprise environments due to perception that they are so secure they will never get attacked and no data will be leaked, but will they become a bigger target due to their growing market share?

Some of the biggest data breaches episodes of the last few years, from Target Corp. to Home Depot., share a common thread. Microsoft Corp. platforms were involved at some level. The most common explanation for the frequency of attacks on Microsoft platforms is that they are more or less everywhere, creating a bigger and more lucrative market opportunity for hackers.

What companies are using Macs?

There are two types of companies that adopt Macs. First one, companies that have Macs here and there, 3-5 in the Marketing department, 2-3 for top management and there are companies like Google who manage over 40000 Macs. Another example is Cisco where…

Read more

CoSoSys Research on Insiders Threats

Recently we conducted a research on our customers to have a more clear idea on the employees’ behavior in relation to company data and we have made some interesting discoveries.

1. Pretty much all employees have access to confidential data and the majority of them don’t even know it

7 out of 10 employees work with financial information, Personal Identifiable Information, marketing plans, customer databases, you name it. To prevent data breaches, a significant number of businesses rely solely on the confidentiality agreement that people sign when they get hired. But they do not realize that those agreements do not guarantee that people will not disclose confidential data by negligence. If 6 out of 10 people are not aware which files are confidential and which are not, you can imagine that they wouldn’t have a problem copying a contract to their personal e-mail address to finish …

Read more

Why so much fuss around data security conferences

In April, we are exhibiting at RSA Conference in San Francisco. With all the preparation for the show, I cannot help but wonder why there is so much fuss around this type of events and I thought of several reasons that may be less obvious. I mean, not the usual ‘stay up to date with the latest trends and the opportunity to network’ ones.

1. For CSOs, CISOs, etc. – personal branding

Marketing speech is not so common among IT security professionals, but that doesn’t mean they shouldn’t apply some of the concepts. Self-branding is about taking the necessary steps to ensure that you are perceived by the people around exactly how you want to be seen – e.g. an expert in your field and that more and more people know you. Basically, you enhance your image or create a certain image for your audience (e.g. potential employers). Chief Security Officers have the opportunity to attend at RSA …

Read more

Welcome to Endpoint Protector Blog

Welcome, everyone, to Endpoint Protector Blog. We are excited to launch this new platform where we can split hairs and talk about Data Loss Prevention, Data Security, Mobile Device Management and other topics we may find interesting along the way.

A few words about CoSoSys, vendor of Endpoint Protector

We are exploring the tangled world of data security since 2004, when threats weren’t so various and sophisticated as they are nowadays. We are based in Cluj-Napoca, in the beautiful and mysterious Transylvania and our products reach businesses all over the world. 

Our mission is to enable businesses and end users around the world to take full advantage of the performance benefits of mobility, portability and communications solutions, without compromising security. To achieve this, we develop solutions that prevent data loss on the ever-increasing number of devices, endpoints

Read more