Huge boost coming in endpoint security spending, study finds

Posted by Camden Swita on August 2 2017

A recent study by a security research firm and antivirus developer shows that a whopping 72 percent of businesses are planning to ramp spending on endpoint security in the coming months. Nearly a third of them plan to significantly boost spending on endpoint security, such as backup, encryption and restore capabilities.

Read More

Topics: Announcements, endpoint encryption, endpoint data protection, data breach, endpoint backup, Ransomware, Data security, endpoint restore, cyber attack

143 million records leaked in July – ransomware racks up huge numbers

Posted by Camden Swita on July 28 2017

Over 143 million valuable, sensitive records were leaked or stolen in July or were reported as previously lost in July. Ransomware, data breaches, leaks and insider theft, a new report shows.

Read More

Topics: Announcements, data breach, Ransomware, Data security, cyber attack

Data breaches are a lot like climate change

Posted by Camden Swita on April 18 2017

Data breaches and climate change are a lot alike. Preventing either requires enough people to care about mistakes made one, two, or ten years ago and to change their daily habits to help prevent a growing, if hard to define, problem.

“Information security is a race between peak indifference to surveillance and the point of no return for data-collection and retention,” Cory Doctorow wrote in a recent article on BoingBoing. “The unprecedented leaks in 2016 were not (merely) the result of data gathered last year; much of that data was gathered in the decades [before] this one, inadequately secured and treated as so inconsequential that Yahoo allowed the NSA to backdoor a billions-strong silo filled with data its customers had not even realized they were filling.”

Read More

Topics: endpoint data protection, data breach, newsletter, data in motion, data at rest, corporate data, Corporate theft, climate change

NYC business leaders gather to discuss data security and internal threats

Posted by Camden Swita on November 1 2016

Over 75 New York business leaders convened at Vaultize’s Cocktails and Conversation event on October 26 to discuss encroaching threats to the security of their companies’ most sensitive data and what can be done about them.

In attendance were directors and executives from Citigroup Private Bank, Stonebridge Capital Markets, Capital One Bank, Société Générale, Goldman Sachs and Berdon LLP. A variety of security issues facing today’s business leaders were brought up in conversations and during a short presentation by Jim Mongillo, Vaultize CEO, including how to deal with threats from internal sources, proper methods for encrypting documents and how to implement an effective DRM strategy.

RSVP for DRM luncheon

Read More

Topics: Press, Announcements, file security, data, data breach, data leakage, DRM

Everything that can go wrong when sending and sharing documents

Posted by Nick Kumes on October 27 2016

In a hypercompetitive economy where enterprises are doing everything they can to turn a profit and increase market share, the last thing a business owner or executive wants to see is innovation and growth sabotaged by cyber criminals, hackers, or irresponsible employees.

Unfortunately, the biggest source of risk for data breaches and leaks comes with one of the essential pillars of business today: email. It’s the preferred method of communication for virtually every company out there, and it is vital that organizations take additional precautions to protect their most sensitive information when using it. In this post I’ll go over a few vulnerabilities related to the uncontrolled sharing of documents and data via email that Vaultize helps companies address every day.

Secure your data

Read More

Topics: FTP, data breach, data leakage, secure email attachment, DRM, control over email

Straw to Brick to Stone: Don’t Get Caught Up in the Network Defense Race

Posted by Mark Chow on October 13 2016

When many people think about data security, they think about network and server security – firewalls, anti-virus, etc. In other words, they think about protection against external threats. Given the press attention paid to breaches caused by “hackers,” this is unsurprising. But external threats only make up less than half of what puts sensitive data, documents and files at risk. At its root, data security is a human error problem, and more often than not breaches and leaks stem from problems within a company’s own ranks.

Read More

Topics: file security, data breach, data leakage, eDRM,, network security, healthcare, EFSS

Assess Your Risk During National Cyber Security Awareness Month

Posted by Camden Swita on October 11 2016


October is National Cyber Security Awareness Month. It’s also the time of year when your organization finalizes its roadmap for next year, so there’s no better time to conduct a data breach preparedness assessment.

Even if you already have a data security strategy in place, it’s critical to take stock often of what’s working and what isn’t and arrange changes to further mitigate your risk of a costly and embarrassing breach or leak. What might have been sufficient to keep your data, documents and files confidential and under your thumb a year or even six months ago may not be enough now. New threats and advancements in threats to your data security crop up all the time and your strategy needs to adapt accordingly.

Read More

Topics: file security, Dropbox Alternative, Box, Secure FIle Sharing, data breach, data leakage, secure email attachment, national cyber security awareness month

4 Things You Can Do to Prevent Data Leakage through Emails

Posted by Anand Kekre on September 29 2016

The number of data leaks and associated financial losses continue to grow significantly year over year. Companies around the world from many industries have seen their sensitive data lost, stolen or leaked to the outside world at an alarming rate—and the problem is only getting worse.

Many of the high-profile leaks and hacks have resulted in millions of dollars in damage to the compromised company, while others have resulted in catastrophic loss of reputation and brand image.

Some of the incidents can be attributed to external threats (hackers) but many if not most of them are caused by mistakes, carelessness and even theft by employees or partners. Among incidents caused by employees or trusted third parties, the vast majority could have been prevented if proactive precautions were taken by the compromised company.

But how can you ensure that employees are handling documents and data appropriately and that nothing goes astray when you’re dealing with email attachments?

Read More

Topics: file security, data, Secure FIle Sharing, data breach, data leakage, eDRM,, email, EFSS

Introducing Multi Factor Authentication in Enterprise File Sync & Share (EFSS)

Posted by Aboli Aradhye on March 16 2016

Why Multi Factor Authentication (MFA)?

Traditional security systems rely on passwords to authenticate and authorize access to protected data. But such password-only systems are, in general, more vulnerable to security breaches as there is only one layer of security. To protect against such breaches, multi-factor authentication (MFA) or two-factor authentication (2FA) is used, which offers extra layer of security. This extra layer of security makes use of information that is accessible only to the user being authenticated.

Read More

Topics: Compliance, enterprise file sharing, Enterprise File Sync & Share, enterprise file security, enterprise digital rights management, data breach, data governance, Multi-Factor Authentication (MFA), Authentication, One Time Password (OTP), Shared-Link Access, RADIUS

Will Safe Harbor Ruling Increase On-premise and Private Cloud Deployments?

Posted by Anand Kekre on October 27 2015

What is Safe Harbor? It is the policy agreement established between the United States Department of Commerce and the European Union (E.U.) in November 2000 to regulate the way that U.S. companies export and handle the personal data (such as names and addresses) of European citizens.

Earlier this month, Court of Justice of the European Union declared that the US Safe Harbor is invalid, directly affecting the European companies that use services of public cloud vendors. It was an eye opener for other geographies as well.

Read More

Topics: enterprise file sharing, enterprise digital rights management, encryption, safe harbor, Data Soverignity, Data Privacy, private cloud, on-premise cloud, regulatory compliance, data breach, data leakage

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics