It’s a good question and one that many organizations don’t think about thoroughly. You take a lot of time onboarding an employee by doing background checks, checking references, and determining what information systems and data access the person needs to do her or his job. You may have a comprehensive provisioning system that grants access to all applications and data. …
4 Reasons You Need Enterprise Digital Rights Management
In today’s business world, information security, regulatory compliance and data governance requirements are driving a top to bottom change in how we manage corporate data. As the walls of an organization blur, new business models make the definition of employee, business partner and corporate information difficult to define. Many companies allow employees to work from any location at anytime using …
Follow Up: Data Encryption is the Answer
Even after suffering from a devastating data breach, National Association of Federal Credit Unions (NAFCU) is dismissing the idea that the data encryption rule should be implemented. Instead, they are saying the credit unions should follow best practices and look into other ways than encryption. Just to refresh your memory, at the end of 2014, the National Credit Union Administration …
Spike in Data Breaches Affects Public Confidence
The recent spike in data breaches this year, 24,000 news stories to be exact, has led to record low levels of confidence amongst the public about data security, according to Deloitte. Last year alone, only 5,474 data breach news stores were reported, and even less in 2012 with 4,023. This number alone does not mean a greater number of data …
Former Employees Stealing Corporate Data
We hear of a lot of insider threats these days with disgruntled employees who have been fired but earlier this month, a former COO of an on demand startup left the company due to tensions with the founders and landed a job with their competition to aid in the company’s international growth. The issue here is that before he left, …
The Dangers of Insider Threats in Critical Infrastructure
It is scary enough that intelligence officials say cyber security no trumps terrorism as the No. 1 threat to the U.S. With the most recent data breach attacks on the White House and Office of Personnel Management, this is just the tip of concern for the federal government. However, it gets even scarier when these breaches are insider threats on …
2014 is The Year of the Data Breach
Without a doubt, 2014 is well on its way to replace 2013 as the highest year on record for exposed records. In the first quarter of 2014 alone a record 43% of American companies reported experiencing hacks according to a study released by the Ponemon Institute. According to the 2014 Identity Theft Resource Center Breach Report, in all the following …
Government Pushes Organizations to Implement Stronger Data Security
From the FBI, Department of Homeland Security (DHS) to the FCC all the way up to the White House is pushing for stronger data security measures amongst organizations that deal with sensitive customer information. Just last week, the FCC fined two telecommunication companies $10 million, for neglecting to protect over 300,000 customers’ personally identifiable information (PII). This is the FCC’s …