How one bank reduced data leaks by 87 percent, saved over $600 million in one year

Posted by Camden Swita on August 24 2017

Multi-national banks send hundreds of sensitive documents each day. These contain highly valuable or private information pertaining to pending business transactions, customers’ personal information and internal business practices and strategy. If any of these documents are leaked or stolen, there’s a very good chance that the bank will suffer massive damage to its reputation, lose customers and partners and spend hundreds of millions of dollars to clean up the mess.

Read More

Topics: data leakage, DRM, bank, auditor, banking

Bottom line: DRM and DLP are actually amazing together

Posted by Ankur Panchbudhe on August 15 2017

Pairing digital rights management (DRM) with content-aware data classification (offered by most DLP vendors including McAfee, Symantec, WebSense and Trustwave) ensures that highly sensitive information is automatically protected while less important information is not. Integrating DRM and DLP is critical to a holistic data protection and IT security strategy.

But enterprise digital rights management (aka information rights management or IRM) and data loss prevention (DLP) have historically been perceived as stand-ins for one another or as competing services.

Read More

Topics: Solutions, Product, Features, enterprise file sharing, Enterprise File Sync & Share, enterprise file security, enterprise digital rights management, Data Loss Prevention

Official, Ironclad Password Rules Dead: What You Need to Know

Posted by Camden Swita on August 10 2017

Most people have been taught to change passwords often, at least every 90 days, and to use phrasess like: L0tz0fB34RZ! (roughly “Lots of Bears!”). These “best practices” are so widely accepted that one can go to almost any company anywhere and find them being used.

But, as it turns out, these password rules do more harm than good. And the man behind them feels sort of bad about it.

Bill Burr, the security specialist who wrote an influential guide on authentication security for the National Institute of Standards and Technology (NIST) in 2003 that spurred these practices, has been walking back some of his advice.

“Much of what I did I now regret,” Burr told the Wall Street Journal recently.

Read More

Topics: One Time Password (OTP), password security, NIST

Huge boost coming in endpoint security spending, study finds

Posted by Camden Swita on August 2 2017

A recent study by a security research firm and antivirus developer shows that a whopping 72 percent of businesses are planning to ramp spending on endpoint security in the coming months. Nearly a third of them plan to significantly boost spending on endpoint security, such as backup, encryption and restore capabilities.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, data breach, endpoint backup, Ransomware, Data security, endpoint restore, cyber attack

143 million records leaked in July – ransomware racks up huge numbers

Posted by Camden Swita on July 28 2017

Over 143 million valuable, sensitive records were leaked or stolen in July or were reported as previously lost in July. Ransomware, data breaches, leaks and insider theft, a new report shows.

Read More

Topics: Announcements, data breach, Ransomware, Data security, cyber attack

Apple patches huge security hole (after hackers exploit it)

Posted by Camden Swita on July 24 2017

Security researcher Exodus Intelligence recently exposed a critical vulnerability in iOS devices and Mac computers that would allow a hacker to access passwords and other information via WiFi.

The vulnerability, called Broadpwn, stems from a bug with the Wi-Fi chipsets in Apple devices. It allows an attacker within range to execute arbitrary code on the target device, access passwords and other files stored on memory and in the cloud. The National Vulnerability Database, published by the National Institute of Standards and Technology, rates the vulnerability as a 9.8 out of 10 on its severity meter, putting it well into the critical range.

Read More

Topics: Mobile Content Management (MCM), Mobile File Sharing, Broadpwn, mobile data security, mobile device management, mobile data encryption, mobile device security

Future cyber attack could be as destructive as superstorm sandy

Posted by Camden Swita on July 18 2017

A future global cyber attack could cause as much economic damage as a major natural disaster like 2012’s Superstorm Sandy, cyber insurance provider Lloyd’s of London wrote in a recent report.

Economic losses could soar to $53 billion and beyond worldwide following an attack on a major cloud service provider, the study, co-written by Lloyd’s and risk-modeling firm Cyence, found.

Read More

Topics: endpoint encryption, endpoint data protection, encryption, endpoint backup, Data security, malware, NotPetya

How It's Made: A Ransomware-riddled Network

Posted by Camden Swita on July 13 2017

A closer look at NotPetya actions after it infected one endpoint

There’s been a lot of talk about how NotPetya made it onto corporate networks in late June. There were two main vectors: attachments in phishing emails and an infected update from tax software made by a Ukrainian company. But how did the ransomware spread after it infected just one endpoint? It had two options: the “flat network” exploit and the “stolen NSA tech” path. The former seems to have been the one most frequently used.

Protect yourself against ransomware

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

Webinar: how to be ready for ransomware and sleep at night

Posted by Camden Swita on July 5 2017

A ransomware attack can cause irreparable damage to your reputation and the health of your organization. A single compromised workstation containing sensitive intellectual property or customer data can be equal to hundreds of thousands or even millions in damages.

Read More

Topics: Announcements, Ransomware, WannaCry, ransomware defense, NotPetya, webinar


Posted by Camden Swita on June 30 2017

As details emerge about the ransomware behind this week’s global attack, NotPetya, one fact is becoming clear: ransomware is becoming more advanced, destructive and harder to kill—weaponized, if you will.

A report on June 30 by Forbes details just how nasty—and sophisticated—the attack was. Experts are saying it’s more of a “superweapon” designed to wreak havoc, spread fast and damage infected machines than a cash-grabbing tool.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, encryption, Russia, endpoint backup, Ransomware, update, Data security, malware, ransomware defense, NotPetya, ukraine

Free Whitepaper: 5 Warnings You Should Heed When Searching For A Dropbox  Alternative Download Here

Subscribe To The Blog By Email

Blog Topics