‘Tis the Season
Data security Secure collaboration

Think About Your Customer’s Document Security

Now that it’s October, fall is in the air (at least in the northeast US) and the leaves are dropping onto the lawns.  It’s time for change and time to think about getting ready for the coming winter.

It’s also a good time to think about changes and planning in your business.  Here are a few suggestions:

Call Your Customers
When is the last time you spoke to your customers?  If you do it regularly, great.  If you haven’t talked to them in awhile, give them a call.  Thank them for their business and see if they need any help.  Communicating through email, newsletters, Twitter and Facebook are all good things, but sometimes you need to talk to someone.

Track it before it gets into the wild
Data security

I was reading an article in Information Week entitled 5 Security Lessons From Real-World Data Breaches that talks about data security and how companies can harden their external and internal defenses.  There was a lot of good information about security infrastructure, including firewalls, network intrusion systems, data loss prevention tools and numerous others.  Most of these tools address data at rest or data in transit.  They tend to exclude data in use.

What is data in use?  It’s what it sounds like.  If a hacker steals a document by exploiting inadequate defenses, they now can use the data they stole.  Most people focus on making sure the data doesn’t get out in the wild, but what do you do when it does.  Encryption techniques help ensure that if a sensitive document gets out, it is unusable by the hacker.  

Is your ACL safe?
Data security

The demand for safe information sharing has increased dramatically, as Enterprise Content Management (ECM) applications are being deployed by companies of all sizes.

ECM applications simplify the management of an organization’s unstructured information (data not in a database).  ECM applications help accelerate business performance by providing easier access to an organization’s core information assets.

The circulation of documents through ECM applications results in an increased risk of information leakage. The need to secure information sharing on the ECM systems has increased as more employees gain access to these repositories.

Hospital establishes electronic medical records protection system
Data security

The healthcare industry will undergo significant changes in the coming months and years ahead. The transition to Electronic Medical Records offers tremendous cost efficiencies, reduction in serious errors and protection of confidential data. Despite all of the advantages over paper based systems, EMR applications still have several areas where sensitive data can be exposed to unauthorized sources.

Reduce Risk due to loss of documents
Data security

Hardly a day goes by that you don’t hear about another loss of confidential information. These events typically occur due to inadequate physical security, missing or improper implementation of technology, not adhering to security procedures or lack of awareness of potential vulnerabilities. Over the last 10 years companies have invested millions of dollars on keeping the bad guys out of their organizations. Unfortunately, today you have to assume the bad guys are already in. Enterprise Digital Rights Management is the best way to protect your confidential data.

Wouldn’t it be nice not to patch software?
Data security

Today I got an email telling me that Microsoft is planning a jumbo patch day next Tuesday.  Microsoft today said it will deliver 10 security updates next week to patch serious bugs in Windows, Internet Explorer, Word and Excel.  I don’t want to pick on Microsoft, since this is a common occurrence with software vendors.  Microsoft gets the lion’s share of the grief, since they have a large percentage of the OS and desktop application market.