How to Ramp Up Your Remote Work Document Protection in  2022
Data breach Data security Insider threat IP Theft Print security Sensitive Unstructured Data

Remote worker in home office settingGartner predicted that roughly 50 % of knowledge workers worldwide should be logging in remotely by now. More remote work puts more sensitive data at risk, which increasingly also impacts manufacturing companies. Check out the following ten tips to ramp up your document protection program in 2022.

Financial Services: How to Boost Your Remote Work Surveillance
Cybersecurity Insider threat Print security Privacy

Image shows wall-mounted home office surveillance camerasRemote work is putting sensitive data at risk. That we can all agree on. Traditional endpoint protection frequently fails. So what about stronger surveillance of remote employees at home? 


Let’s monitor the heck out of them, shall we?

How to Maximize M&A Security With Enterprise DRM
Data breach Data security Insider threat IP Theft Print security Sensitive Unstructured Data

M&A Leaks: Image shows a leaking bucketMergers and acquisition (M&A) activities pose major document protection challenges for all parties involved. Leaked or stolen data has caused bidding wars, broken deals, cost millions of dollars in damages, and ruined reputations. How can M&A teams ensure maximum document security without impeding productivity?

Data-Centric Security in the Boardroom
Data breach Data security Mobile security Print security Privacy Secure collaboration

Boardroom Data Security starts by protecting board communications and documentsWith so many high profile data breaches in the public eye recently, cyber security is now front and center in many organizations.  Globally cyber attacks and data leaks are daily threats to organizations, reminding everyone that we are all potential targets. Attorneys are warning about potential individual liability for corporate directors who do not take appropriate responsibility for oversight of cyber security while investors and regulators are pushing boards to step up their oversight.  As a result, corporate boards have woken up to the call that they must address cyber security issues on their front lines, as it is no longer just an Information Technology issue.

Protect Against R&D Data Theft
Data breach Data security Insider threat Mobile security Print security

Protect Against R&D Data TheftRecently I was in a meeting with a global pharmaceutical client in New Jersey who told me of the importance they place on their highly secure, centrally managed and monitored persistent security platform to protect against data theft and ensure that their valuable R&D information cannot be lost or inadvertently sent to a competitor.

As the meeting ended, I was informed of the news about the charges brought against five people in the Untied States around trade secret theft inside another global pharmaceutical company. Allegedly a senior level manager at the company was involved in this theft.

Given the global state of business competition, there is a special appeal to the cyber thugs with high-priced or high-demand items. There is an alarming interest in stealing intellectual property, trade secrets and exactly how these items are produced.

Paper Printouts and Prevention of Employee Data Theft
Data breach Data security Insider threat Print security

Paper Printouts and Prevention of Employee Data TheftLast year, a Montefiore Medical Center employee in New York stole names, addresses, dates of birth, Social Security numbers, next of kin information and health insurance details of more than 12,000 patients and used those identities to purchase clothing and other merchandise from some of New York’s finest department stores. The employee printed thousands of patients’ records every day and sold them for $3 per copy to outside accomplices. The hospital had no way of preventing or controlling this activity.

The same year, an employee of the Children’s Medical Clinics of East Texas with a retaliatory agenda to cause damage to the clinic’s reputation, stole and improperly disclosed the confidential data of 16,000 patients by taking paper records from the facility and sending screenshots of electronic patient records to a former clinic employee.

Today increasing regulations and standards for managing sensitive or confidential information are raising the stakes higher and higher. This in turn forces many organizations to look for ways to implement data security to comply with various mandates.  Most organizations secure sensitive information at rest and in motion, but not while in use.

The Dangers of Smart Printer Devices
Print security

The Dangers of Smart Printer Devices

Printers are definitely not what they used to be a decade ago. They have evolved and are becoming more involved in organizations’ networks, as well as an increase in multifaceted functions that have made them vulnerable and threaten the stability of the entire network. Hackers and insiders have made their case by causing internal and external data breaches through these printers.

Nowadays although there has been a great push to secure mobile devices and their data, organizations neglect to additionally secure their network and internet-enabled printers. The reason this is such a concern now, is that from these mobile devices you are now able to print, scan to email, network drives and scan to web-hosted applications.

Reducing Data Breaches through Printing Errors
Data breach Insider threat Print security

Reducing Data Breaches through Printing ErrorsWe’ve heard of data breaches by insiders but not in the way of printing errors. Although between the two kinds of insider threats, malicious and by accident, this is considered by accident, this can be a big headache for organizations. Whether it is leaving printouts of sensitive data on the printer unattended after printing or printing errors due to human error, this can all lead to data breaches.

In a recent article, a health care organization had to alert 4,000 patients that their personal data had been exposed due to a printing error. What should have been a fairly easy printing job mistakenly put one unique patient’s information on one side and another patients on the back page, which should have been a notice to explain new rules regarding a certain type of medicine. Unfortunately, mistakes occur, and when that employee mistypes or prints the wrong document, a major data breach can occur.