Multi-national banks send hundreds of sensitive documents each day. These contain highly valuable or private information pertaining to pending business transactions, customers’ personal information and internal business practices and strategy. If any of these documents are leaked or stolen, there’s a very good chance that the bank will suffer massive damage to its reputation, lose customers and partners and spend hundreds of millions of dollars to clean up the mess.
Read More
Topics:
data leakage,
DRM,
bank,
auditor,
banking
Pairing digital rights management (DRM) with content-aware data classification (offered by most DLP vendors including McAfee, Symantec, WebSense and Trustwave) ensures that highly sensitive information is automatically protected while less important information is not. Integrating DRM and DLP is critical to a holistic data protection and IT security strategy.
But enterprise digital rights management (aka information rights management or IRM) and data loss prevention (DLP) have historically been perceived as stand-ins for one another or as competing services.
Read More
Topics:
Solutions,
Product,
Features,
enterprise file sharing,
Enterprise File Sync & Share,
enterprise file security,
enterprise digital rights management,
Data Loss Prevention
Most people have been taught to change passwords often, at least every 90 days, and to use phrasess like: L0tz0fB34RZ! (roughly “Lots of Bears!”). These “best practices” are so widely accepted that one can go to almost any company anywhere and find them being used.
But, as it turns out, these password rules do more harm than good. And the man behind them feels sort of bad about it.
Bill Burr, the security specialist who wrote an influential guide on authentication security for the National Institute of Standards and Technology (NIST) in 2003 that spurred these practices, has been walking back some of his advice.
“Much of what I did I now regret,” Burr told the Wall Street Journal recently.
Read More
Topics:
One Time Password (OTP),
password security,
NIST
A recent study by a security research firm and antivirus developer shows that a whopping 72 percent of businesses are planning to ramp spending on endpoint security in the coming months. Nearly a third of them plan to significantly boost spending on endpoint security, such as backup, encryption and restore capabilities.
Read More
Topics:
Announcements,
endpoint encryption,
endpoint data protection,
data breach,
endpoint backup,
Ransomware,
Data security,
endpoint restore,
cyber attack
Over 143 million valuable, sensitive records were leaked or stolen in July or were reported as previously lost in July. Ransomware, data breaches, leaks and insider theft, a new report shows.
Read More
Topics:
Announcements,
data breach,
Ransomware,
Data security,
cyber attack
Security researcher Exodus Intelligence recently exposed a critical vulnerability in iOS devices and Mac computers that would allow a hacker to access passwords and other information via WiFi.
The vulnerability, called Broadpwn, stems from a bug with the Wi-Fi chipsets in Apple devices. It allows an attacker within range to execute arbitrary code on the target device, access passwords and other files stored on memory and in the cloud. The National Vulnerability Database, published by the National Institute of Standards and Technology, rates the vulnerability as a 9.8 out of 10 on its severity meter, putting it well into the critical range.
Read More
Topics:
Mobile Content Management (MCM),
Mobile File Sharing,
Broadpwn,
mobile data security,
mobile device management,
mobile data encryption,
mobile device security
A future global cyber attack could cause as much economic damage as a major natural disaster like 2012’s Superstorm Sandy, cyber insurance provider Lloyd’s of London wrote in a recent report.
Economic losses could soar to $53 billion and beyond worldwide following an attack on a major cloud service provider, the study, co-written by Lloyd’s and risk-modeling firm Cyence, found.
Read More
Topics:
endpoint encryption,
endpoint data protection,
encryption,
endpoint backup,
Data security,
malware,
NotPetya
A closer look at NotPetya actions after it infected one endpoint
There’s been a lot of talk about how NotPetya made it onto corporate networks in late June. There were two main vectors: attachments in phishing emails and an infected update from tax software made by a Ukrainian company. But how did the ransomware spread after it infected just one endpoint? It had two options: the “flat network” exploit and the “stolen NSA tech” path. The former seems to have been the one most frequently used.

Read More
Topics:
Announcements,
endpoint encryption,
endpoint data protection,
encryption,
Russia,
endpoint backup,
Ransomware,
update,
Data security,
malware,
ransomware defense,
NotPetya,
ukraine
A ransomware attack can cause irreparable damage to your reputation and the health of your organization. A single compromised workstation containing sensitive intellectual property or customer data can be equal to hundreds of thousands or even millions in damages.
Read More
Topics:
Announcements,
Ransomware,
WannaCry,
ransomware defense,
NotPetya,
webinar
As details emerge about the ransomware behind this week’s global attack, NotPetya, one fact is becoming clear: ransomware is becoming more advanced, destructive and harder to kill—weaponized, if you will.
A report on June 30 by Forbes details just how nasty—and sophisticated—the attack was. Experts are saying it’s more of a “superweapon” designed to wreak havoc, spread fast and damage infected machines than a cash-grabbing tool.
Read More
Topics:
Announcements,
endpoint encryption,
endpoint data protection,
encryption,
Russia,
endpoint backup,
Ransomware,
update,
Data security,
malware,
ransomware defense,
NotPetya,
ukraine