NYC business leaders gather to discuss data security and internal threats

Posted by Camden Swita on November 1 2016

Over 75 New York business leaders convened at Vaultize’s Cocktails and Conversation event on October 26 to discuss encroaching threats to the security of their companies’ most sensitive data and what can be done about them.

In attendance were directors and executives from Citigroup Private Bank, Stonebridge Capital Markets, Capital One Bank, Société Générale, Goldman Sachs and Berdon LLP. A variety of security issues facing today’s business leaders were brought up in conversations and during a short presentation by Jim Mongillo, Vaultize CEO, including how to deal with threats from internal sources, proper methods for encrypting documents and how to implement an effective DRM strategy.

RSVP for DRM luncheon

Read More

Topics: Press, Announcements, file security, data, data breach, data leakage, DRM

Everything that can go wrong when sending and sharing documents

Posted by Nick Kumes on October 27 2016

In a hypercompetitive economy where enterprises are doing everything they can to turn a profit and increase market share, the last thing a business owner or executive wants to see is innovation and growth sabotaged by cyber criminals, hackers, or irresponsible employees.

Unfortunately, the biggest source of risk for data breaches and leaks comes with one of the essential pillars of business today: email. It’s the preferred method of communication for virtually every company out there, and it is vital that organizations take additional precautions to protect their most sensitive information when using it. In this post I’ll go over a few vulnerabilities related to the uncontrolled sharing of documents and data via email that Vaultize helps companies address every day.

Secure your data

Read More

Topics: FTP, data breach, data leakage, secure email attachment, DRM, control over email

Straw to Brick to Stone: Don’t Get Caught Up in the Network Defense Race

Posted by Mark Chow on October 13 2016

When many people think about data security, they think about network and server security – firewalls, anti-virus, etc. In other words, they think about protection against external threats. Given the press attention paid to breaches caused by “hackers,” this is unsurprising. But external threats only make up less than half of what puts sensitive data, documents and files at risk. At its root, data security is a human error problem, and more often than not breaches and leaks stem from problems within a company’s own ranks.

Read More

Topics: file security, data breach, data leakage, eDRM,, network security, healthcare, EFSS

Assess Your Risk During National Cyber Security Awareness Month

Posted by Camden Swita on October 11 2016


October is National Cyber Security Awareness Month. It’s also the time of year when your organization finalizes its roadmap for next year, so there’s no better time to conduct a data breach preparedness assessment.

Even if you already have a data security strategy in place, it’s critical to take stock often of what’s working and what isn’t and arrange changes to further mitigate your risk of a costly and embarrassing breach or leak. What might have been sufficient to keep your data, documents and files confidential and under your thumb a year or even six months ago may not be enough now. New threats and advancements in threats to your data security crop up all the time and your strategy needs to adapt accordingly.

Read More

Topics: file security, Dropbox Alternative, Box, Secure FIle Sharing, data breach, data leakage, secure email attachment, national cyber security awareness month

4 Things You Can Do to Prevent Data Leakage through Emails

Posted by Anand Kekre on September 29 2016

The number of data leaks and associated financial losses continue to grow significantly year over year. Companies around the world from many industries have seen their sensitive data lost, stolen or leaked to the outside world at an alarming rate—and the problem is only getting worse.

Many of the high-profile leaks and hacks have resulted in millions of dollars in damage to the compromised company, while others have resulted in catastrophic loss of reputation and brand image.

Some of the incidents can be attributed to external threats (hackers) but many if not most of them are caused by mistakes, carelessness and even theft by employees or partners. Among incidents caused by employees or trusted third parties, the vast majority could have been prevented if proactive precautions were taken by the compromised company.

But how can you ensure that employees are handling documents and data appropriately and that nothing goes astray when you’re dealing with email attachments?

Read More

Topics: file security, data, Secure FIle Sharing, data breach, data leakage, eDRM,, email, EFSS

Introducing Multi Factor Authentication in Enterprise File Sync & Share (EFSS)

Posted by Aboli Aradhye on March 16 2016

Why Multi Factor Authentication (MFA)?

Traditional security systems rely on passwords to authenticate and authorize access to protected data. But such password-only systems are, in general, more vulnerable to security breaches as there is only one layer of security. To protect against such breaches, multi-factor authentication (MFA) or two-factor authentication (2FA) is used, which offers extra layer of security. This extra layer of security makes use of information that is accessible only to the user being authenticated.

Read More

Topics: Compliance, enterprise file sharing, Enterprise File Sync & Share, enterprise file security, enterprise digital rights management, data breach, data governance, Multi-Factor Authentication (MFA), Authentication, One Time Password (OTP), Shared-Link Access, RADIUS

Will Safe Harbor Ruling Increase On-premise and Private Cloud Deployments?

Posted by Anand Kekre on October 27 2015

What is Safe Harbor? It is the policy agreement established between the United States Department of Commerce and the European Union (E.U.) in November 2000 to regulate the way that U.S. companies export and handle the personal data (such as names and addresses) of European citizens.

Earlier this month, Court of Justice of the European Union declared that the US Safe Harbor is invalid, directly affecting the European companies that use services of public cloud vendors. It was an eye opener for other geographies as well.

Read More

Topics: enterprise file sharing, enterprise digital rights management, encryption, safe harbor, Data Soverignity, Data Privacy, private cloud, on-premise cloud, regulatory compliance, data breach, data leakage

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics