Blog

Top 10 Tips To Prevent A Data Breach
Data breach Data security Insider threat Print security Privacy

Top 10 Tips to Stop a Data BreachData breaches continue to torment organizations.  There are numerous examples of malicious or inadvertent data breaches throughout businesses and organizations of all types and sizes.  Hackers get all the press, but insiders pose as great a risk as any external party when it comes to vulnerabilities.

Regardless of who you are, your information is under attack.

With the start of September and most employers still focused on remote workers, now is a good time for a few tips on preventing a data breach.

Enterprise DRM and DLP: Comparison Made Simple
Application Security Testing Data security Insider threat IP Theft Sensitive Unstructured Data

 

DLP (the traffic cop) vs. DRM (the armored truck)Like digital rights management (DRM) for the enterprise, data loss prevention (DLP) solutions have recently seen a resurgence. Both aim to protect sensitive documents against leakage and exfiltration. Those looking to deploy or expand one or the other frequently weigh DRM vs. DLP. But how helpful is this “either/or” perspective really?

Document Protection: How to Secure a PDF?
Data security Insider threat IP Theft Sensitive Unstructured Data

Download PDF IconDo you know where all your sensitive PDF files are stored?  How well are they protected, and who can access them?

Answering these questions becomes more urgent as unstructured data now accounts for about 80% of business data inventories.  Adobe’s platform-independent PDF files make up a large share of that.

So how can you protect PDF files from prying eyes and against unauthorized editing, printing, copying, or screenshots?  You have several options to pick from:

Why Data-Centric Security Matters
Data breach Data security Insider threat

Protect your sensitive data with FasooInformation security is a big arena, and it seems like there are more and more holes to plug every year.  Most organizations focus on perimeter-based security intending to keep out the bad guys.  Unfortunately, that doesn’t address the accidental or malicious exposure of sensitive information by trusted insiders.  Enterprise based data-centric security is security for individual files that keep data safe even after it’s left a company’s secure network — and that can be a lifesaver.

To understand why let’s look at the story of Company X.  The Company was a strong, growing, medium-sized enterprise that was earning a reputation in its field.  Leadership was aware of the need for strong data security, and the top-level executives invested a lot of time, effort, and money into securing the Company’s network and backing up all files.  Its information security efforts focused both internally and externally: they went far beyond a firewall to keep out hackers, implementing smart policies and security controls on internal users to prevent intentional or accidental breaches of sensitive files.

IP Protection Over Workflows? “People don’t want their productivity to dip”
Cybersecurity Insider threat IP Theft Secure collaboration Sensitive Unstructured Data

Image shows a screenshot (top left), Hillary Fehr (GE), and Chris Babie (GE) of the IP Protection Fireside Chat: Fasoo's Ron ArdenHow to stop intellectual property leakage and theft in manufacturing?

That was the topic of a discussion hosted by Fasoo at the 2021 Apex Assembly Tech Leaders Northeast Summit. CTO Ron Arden spoke with Hillary Fehr, Senior Cyber Security Researcher with GE Gas Power, and Chris Babie, Staff Cyber Security Researcher with GE Gas Power, about the challenges of IP protection in the manufacturing enterprise. 

In Part 1 of this conversation, IP Protection: “We need a tool with a wider scope”, we focused on how to protect sensitive CAD files, 3D-PDFs and other PDF file formats, in addition to the wide variety of Microsoft Office and other documents typically found in innovation-driven manufacturing companies.

In this post, Ron, Hillary and Chris zoom in on additional insider threats and risks introduced through the rise of the cloud and the rapid shift to work-from-home due to COVID-19.

What advice do the GE security researchers have for IT leaders in manufacturing companies looking to update their document protection program? Find out in Part 2 of the conversation:

*

What’s the Biggest Challenge Manufacturing Companies Face in Their Fight Against IP Theft?
Data breach Data security Insider threat IP Theft

World IP Day 2021 Image - Technology

Did you know April 26th is World IP Day? It was designated by the member states of WIPO, the IP forum of the United Nations, to increase the general understanding of intellectual property and how it enables technological innovation.

Let’s celebrate with a roundup post. Perhaps you enjoyed the recent discussion on this blog with GE Gas Power cybersecurity researchers Hillary Fehr and Chris Babie of the challenges involved with protecting IP in manufacturing? Or the insights shared by Markus Fischer, VP Engineering at ZF Group’s Active Safety Systems division, into IP theft and IP protection of CAD files in the automotive industry?

We know we did. For this World IP Day post, we asked more IP protection thought leaders what they think the biggest challenge is for manufacturers battling IP theft. Read their responses below:

IP Protection: “We need a tool with a wider scope”
Data security Insider threat IP Theft Secure collaboration

Image shows a screenshot (top left), Hillary Fehr (GE), and Chris Babie (GE) of the IP Protection Fireside Chat: Fasoo's Ron Arden

At the 2021 Apex Assembly Tech Leaders Northeast Summit in March, Fasoo hosted a discussion on IP protection in manufacturing. CTO Ron Arden spoke with GE Gas Power cybersecurity researchers Hillary Fehr and Chris Babie about protecting R&D, product designs, specifications, and other sensitive intellectual property (IP). 

*

The IP Protection Capability More Manufacturing IT Leaders Wish They Had
Data security Insider threat IP Theft Sensitive Unstructured Data

 

Photo: Federal Courthouse in Portland, OR

Global manufacturers in innovation-driven industries are ramping up their document protection against intellectual property theft.

Can you guess what tops their priority list when selecting or expanding enterprise-wide digital rights management (DRM)? Here’s a hint.

IP Theft in the Automotive Industry: 10 Tips to Counter the Insider Threat
Data security Insider threat Secure collaboration Sensitive Unstructured Data

IP Theft Insider Threat Photo MontageNo matter if your company is an automotive OEM, Tier 1-3 supplier, or a small engineering studio that serves component manufacturers across various industries: all eyes are on you.

The eyes of commercial spies, that is. 

Intellectual property (IP) theft, most of it on behalf of China, damages the US economy to the tune of about $500 billion a year, says the FBI. Automotive, aerospace, and other innovation-driven tech companies are bearing the brunt of commercial espionage efforts.

What do the nation-states and competitors behind the IP theft have in common? They all rely on a secret weapon: company insiders