Securing Information While Sharing

In a recent article entitled “Securing Information for a Shared Services Infrastructure”, Richard Freeman from Ricoh Canada talked about the need to secure information as companies share it internally and externally.  The focus of the article is how an organization must look at balancing the need to efficiently share information without compromising privacy, protection of intellectual property and other sensitive …

How to Protect IP Mappings from Falling into the Wrong Hands

In my recent article for IP Watchdog, Taking a Data-Centric Approach to Today’s Security Landscape, I highlighted the importance of organizations taking a data-centric approach to security to safeguard against today’s sophisticated, and even amateur, cybercriminals.  IP Watchdog particularly focuses on the security of all things IP (intellectual property) which brings us to another sector of high valued information—IP mappings. …

STOP, Collaborate and Listen: Where Employee Vulnerabilities Put Data at Risk

Ron Arden, Executive Vice President and COO of Fasoo, Inc., recently drafted a byline for InfoSec Island that highlights the risks employees pose in their most natural environment – the office – through collaboration with their co-workers.  Email, instant messages, file transfers, and digital downloads can all expose vulnerabilities to an organization’s high-value data yet in an office environment these …

Keep Your High-Value Information Close, and Your Employees Closer

I recently wrote an article for Corporate Compliance Insights that focused on the importance of organizations taking proactive steps to safeguard high-value corporate data from internal and external vulnerabilities. High value information such as trade secrets, product designs, financial data and customer data can change hands often within an organization, including among people who may not need access to this …

Stop The Leading Cause of Healthcare Data Breaches

The Pain Treatment Centers of America (PTCOA) recently released a HIPAA Security Notification that a 2015 data breach may have exposed the personal information of as many as 19,000 patients. This healthcare data breach involved hackers accessing EHR system files through data servers owned and operated by a third-party. The breached files included patient medical records, along with health visit …

A Data-Centric Security Framework for a Perimeter-less World

The internet, its commercialization and all its technological advances have changed the way of the modern world. Unlimited information is available at the touch of a button; tasks that used to take time and effort are now much simpler.  All this technology created the opportunity for companies to find new and creative ways to grow revenues and data collection has …