The Risks of Unsecure Email Attachments

Posted by Gary Cooke on November 15 2016

Having spent most of my business career managing and designing corporate messaging systems and/or consulting with companies on messaging and archiving best practices, there is one common thread that’s persisted throughout that entire experience: people sharing data with others through unsecured attachments.

This practice has been happening since the first email systems were created for business and personal use, and those of us on the administrative side of messaging have tried different methods to secure data being shared internally or externally.  If you worked in a large corporation you had a network team that had the single function of protecting the company’s network infrastructure from the evildoers outside of the network. The messaging team was responsible for ensuring that all the emails were delivered to their intended recipients and that no harmful messages (virus, malware, scams or even pornography, in the old days) entered the sanctity of the corporate environment. If you worked in a small to medium company those two teams might be a single person. Yet the job description was the same: protect the company’s data.

In these endeavors, the major concern was then as it is now: Do we know what our employees are sharing and, more importantly, with whom they’re sharing?

Secure your data

Read More

Topics: file security, email, secure email attachment, network security, DRM, control over email

NYC business leaders gather to discuss data security and internal threats

Posted by Camden Swita on November 1 2016

Over 75 New York business leaders convened at Vaultize’s Cocktails and Conversation event on October 26 to discuss encroaching threats to the security of their companies’ most sensitive data and what can be done about them.

In attendance were directors and executives from Citigroup Private Bank, Stonebridge Capital Markets, Capital One Bank, Société Générale, Goldman Sachs and Berdon LLP. A variety of security issues facing today’s business leaders were brought up in conversations and during a short presentation by Jim Mongillo, Vaultize CEO, including how to deal with threats from internal sources, proper methods for encrypting documents and how to implement an effective DRM strategy.

RSVP for DRM luncheon

Read More

Topics: Press, Announcements, file security, data, data breach, data leakage, DRM

Top Data leaks Caused by Poor DRM, File Tracking and Encryption systems

Posted by Camden Swita on October 25 2016

It's amazing how many major data breaches and leaks result from the basic mishandling of sensitive data and a lack of DRM polciies governing access to that data.

If you’re not familiar with the website Information Is Beautiful, spend some time falling down that rabbit hole. It’s a massive collection of interactive infographics showing trends covering everything from the peak age of geniuses to topics hyped by the media over the years and yes, you guessed it, recent data security incidents and their causes.

Secure your data

Read More

Topics: file security, data governance, data leakage, eDRM,, DRM, Panama Papers

Straw to Brick to Stone: Don’t Get Caught Up in the Network Defense Race

Posted by Mark Chow on October 13 2016

When many people think about data security, they think about network and server security – firewalls, anti-virus, etc. In other words, they think about protection against external threats. Given the press attention paid to breaches caused by “hackers,” this is unsurprising. But external threats only make up less than half of what puts sensitive data, documents and files at risk. At its root, data security is a human error problem, and more often than not breaches and leaks stem from problems within a company’s own ranks.

Read More

Topics: file security, data breach, data leakage, eDRM,, network security, healthcare, EFSS

Assess Your Risk During National Cyber Security Awareness Month

Posted by Camden Swita on October 11 2016


October is National Cyber Security Awareness Month. It’s also the time of year when your organization finalizes its roadmap for next year, so there’s no better time to conduct a data breach preparedness assessment.

Even if you already have a data security strategy in place, it’s critical to take stock often of what’s working and what isn’t and arrange changes to further mitigate your risk of a costly and embarrassing breach or leak. What might have been sufficient to keep your data, documents and files confidential and under your thumb a year or even six months ago may not be enough now. New threats and advancements in threats to your data security crop up all the time and your strategy needs to adapt accordingly.

Read More

Topics: file security, Dropbox Alternative, Box, Secure FIle Sharing, data breach, data leakage, secure email attachment, national cyber security awareness month

Don't Sit On Your Security Problem - Do Something About It

Posted by Ankur Panchbudhe on October 6 2016

I meet a lot of managers and executives at organizations around the world who aren’t sure if their organization’s data is really secure or not. Many of them know their employees are using consumer-grade file sharing platforms every single day and sending unencrypted email attachments, but they often assume that the developers of the consumer-grade products – Dropbox, Google, etc. – are somehow protecting their data from breaches and leaks. They’re in essence setting their organization up for a big, expensive mess.

It’s easy to believe that as we work in today’s always on, always connected world, we are for the most part safe from cybersecurity threats that we read about in the news. But the truth is that we and the companies that we work at are not. Data leaks, breaches and thefts are, frankly, inevitable if proper precautions are not taken. And they often come as results not of malicious hackers bypassing network security but of mistakes made by employees in dispersing or sharing sensitive information or of intentional leakage and theft by disgruntled workers.

Read More

Topics: File Sharing, Information Security, file security, vDRM, DRM

4 Things You Can Do to Prevent Data Leakage through Emails

Posted by Anand Kekre on September 29 2016

The number of data leaks and associated financial losses continue to grow significantly year over year. Companies around the world from many industries have seen their sensitive data lost, stolen or leaked to the outside world at an alarming rate—and the problem is only getting worse.

Many of the high-profile leaks and hacks have resulted in millions of dollars in damage to the compromised company, while others have resulted in catastrophic loss of reputation and brand image.

Some of the incidents can be attributed to external threats (hackers) but many if not most of them are caused by mistakes, carelessness and even theft by employees or partners. Among incidents caused by employees or trusted third parties, the vast majority could have been prevented if proactive precautions were taken by the compromised company.

But how can you ensure that employees are handling documents and data appropriately and that nothing goes astray when you’re dealing with email attachments?

Read More

Topics: file security, data, Secure FIle Sharing, data breach, data leakage, eDRM,, email, EFSS

Vaultize Achieves Accelerated Growth in Financial Year 2015-16

Posted by Anand Kekre on April 14 2016

We are happy to announce that the Company achieved accelerated growth of over 500 percent in revenue for the financial year ending March 2016. We added several large enterprise customers across geographies and verticals to our customer base – fueling our accelerated growth.

Financial_growth_2016.jpg

Read More

Topics: Mobile Content Management (MCM), Digital Rights Management (DRM), Compliance, file security, Enterprise Mobility Management, Enterprise File Sync & Share, endpoint data protection, Data Loss Prevention (DLP), data governance, Return On Investment (ROI)

Securing Office 365 Email Attachments with Vaultize Plugin

Posted by Praneeth Ponaka on March 10 2016

Over last couple of years organizations have increasingly adopting Office 365. Enterprise IT is looking for ways to secure environment such that corporate data still stays in its control (in line with data governance and compliance objectives of the business) even after the rollout of Office 365.

Read More

Topics: Digital Rights Management (DRM), Compliance, file security, Vault KNOX, Secure FIle Sharing, Online Document Viewer, Digital Watermarking, Access Control, Data Loss Prevention (DLP), Enterprise Rights Management, data governance, Geo/IP Fencing, Data De-duplication, Office 365 Attachments

WhatsApp Adds File Sharing – Another Reason for CIO to Look for Mobile-friendly Secure Enterprise File Sharing

Posted by Sayali Kekre on March 4 2016

Facebook-owned WhatsApp messaging service (one of the most popular consumer applications) has introduced file sharing (currently only PDF). For consumers this is a moment to cheer. But given that corporate employees are increasingly using WhatsApp for communication, the addition of document sharing is another data leakage channel that every CIO needs to pay attention to.

Read More

Topics: Mobile Content Management (MCM), Compliance, file security, enterprise file sharing, Secure FIle Sharing, enterprise digital rights management, Shadow-IT, Access Control, encryption, data governance, Mobile File Sharing, data leakage

Free White Paper: 6 Essentials For 100% Secure Enterprise File Sharing

Subscribe To The Blog By Email

Blog Topics