by Shlom | Jun 12, 2017 | Uncategorized
In spite of the big headlines about external hacks or insider attacks leading to data loss, it is true that most of the corporate data that gets exposed is through messaging systems. Employees accidentally sending out confidential information through email, instant...
by Shlom | Jun 12, 2017 | Uncategorized
In the modern world of financial services, the protection of your customer’s data is critical. Not only critical for your company’s reputation but to avoid a whole host of legal and financial obligations should a data breach ever happen. Encryption is one...
by Shlom | Jun 12, 2017 | Uncategorized
According to some studies, over two-thirds of lost smart phones contain sensitive or confidential business information. This can lead to, sometimes serious, breaches of data and confidentiality. With the increasing use of mobile hardware in businesses – whether this...
by Shlom | Jun 12, 2017 | IOT technology
For many years one of the easiest ways to control access to data has been through the use of roles. Each user in an organization was traditionally assigned a ‘role’ by IT security and this role determined the amount of information and level of access...
by Shlom | Jun 12, 2017 | Uncategorized
If anything, recent attacks have shown that there is no single solution to the complex challenge of being protected against insider threats within an enterprise. However, one major defense against such issues is putting in place prudent policies, with strict limits,...