Getting Granular: Why You Need Granular Access Controls

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration

In my last post, I said “Without granular access controls, you can’t prevent a user from copying data from a file and pasting it into an email, for example. If you only encrypt a file and do not prevent copy and paste or printing, a user can easily compromise security.” And I meant it. Now,  you might be asking yourself …

Your Sensitive Data is at Risk: How Do You Manage Insider Threats?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy

Picture it.  Your employees access sensitive and confidential customer information every day so they can do their jobs. Once the data leaves the protected confines of an information repository, file share or cloud-based service, your authorized users can share it with anyone, do anything with it and compromise your customer’s confidential information or your intellectual property.  As a result, you …

I Want YOU…

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Mobile security, Print security, Privacy

To think about stronger data security and privacy protection! But first, I want you to think about the millions of heroes who have served our country. As we approach the 4th of July, I wanted to take a moment to recognize the heroes in the many branches of the U.S. Military.  From myself, and on behalf of the entire team …

Another day, another… $853K?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Privacy

This has been on my mind. A lot. Every day, I open my email to find news about how a company needs to pay a fine or a fee to either an individual or a regulator because data was leaked or stolen. This one in particular caught my eye because it is a classic example of data being accessed by …

Top Four Security Predictions For 2017

Ron Arden Cybersecurity, Data breach, Data security, Insider threat Leave a Comment

2016 has been an epic year for cyber security and data breaches.  From recent hacks at Yahoo and LinkedIn to problems at the FDIC and stolen intellectual property from Glaxo-Smith Kline, this year has been a boon for data breaches large and small. The past year has shown us that malicious attacks and inadvertent mistakes continue at an alarming rate …

Mobility and Prevention of Employee Data Theft

Ron Arden Data breach, Data security, Insider threat, Mobile security Leave a Comment

Gone are the days when everyone came into the office everyday for work.  Changes in work habits have brought substantial growth in mobility adoption within the workforce and security challenges have followed. Today’s employees increasingly work from outside the office and they use a number of mobile (often personal) devices to complete their daily business tasks.  Gallup’s Work and Education …