It Takes a Village to Raise a Child, Right? It Takes a Team to Develop a Data Governance Strategy!

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy Leave a Comment

The phrase “It takes a Village to raise a child” is true.  But it is also true that it takes a team to develop a data governance and policy management strategy! In my last post, I talked about teamwork and how important it is when developing a data security strategy. As part of that process, data governance and policy management …

Geese at the ISMG Cybersecurity Summit in New York? It’s all about teamwork!

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration Leave a Comment

Last week, Fasoo sponsored and participated in the ISMG Cybersecurity Summit in New York City.   It was a great event, well attended and in the Theater District and the ISMG folks were awesome to work with! As part of our sponsorship, we had a 10 minute Tech Spotlight where I, rather than providing a “death by powerpoint” tech dump, I …

Getting Granular: Why You Need Granular Access Controls

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy, Secure collaboration

In my last post, I said “Without granular access controls, you can’t prevent a user from copying data from a file and pasting it into an email, for example. If you only encrypt a file and do not prevent copy and paste or printing, a user can easily compromise security.” And I meant it. Now,  you might be asking yourself …

Your Sensitive Data is at Risk: How Do You Manage Insider Threats?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Print security, Privacy

Picture it.  Your employees access sensitive and confidential customer information every day so they can do their jobs. Once the data leaves the protected confines of an information repository, file share or cloud-based service, your authorized users can share it with anyone, do anything with it and compromise your customer’s confidential information or your intellectual property.  As a result, you …

I Want YOU…

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Mobile security, Print security, Privacy

To think about stronger data security and privacy protection! But first, I want you to think about the millions of heroes who have served our country. As we approach the 4th of July, I wanted to take a moment to recognize the heroes in the many branches of the U.S. Military.  From myself, and on behalf of the entire team …

Another day, another… $853K?

Deborah Kish Cybersecurity, Data breach, Data security, Insider threat, Privacy

This has been on my mind. A lot. Every day, I open my email to find news about how a company needs to pay a fine or a fee to either an individual or a regulator because data was leaked or stolen. This one in particular caught my eye because it is a classic example of data being accessed by …

Top Four Security Predictions For 2017

Ron Arden Cybersecurity, Data breach, Data security, Insider threat Leave a Comment

2016 has been an epic year for cyber security and data breaches.  From recent hacks at Yahoo and LinkedIn to problems at the FDIC and stolen intellectual property from Glaxo-Smith Kline, this year has been a boon for data breaches large and small. The past year has shown us that malicious attacks and inadvertent mistakes continue at an alarming rate …

Mobility and Prevention of Employee Data Theft

Ron Arden Data breach, Data security, Insider threat, Mobile security Leave a Comment

Gone are the days when everyone came into the office everyday for work.  Changes in work habits have brought substantial growth in mobility adoption within the workforce and security challenges have followed. Today’s employees increasingly work from outside the office and they use a number of mobile (often personal) devices to complete their daily business tasks.  Gallup’s Work and Education …