Home  //  Blog
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Key industries need to keep data and email secure Subscribe Email Print

legalEveryday scenarios, highlighted by NetworkWorld magazine, illustrate where sensitive and confidential content and files need to be better managed.

Healthcare practitioners share sensitive files with remote colleagues, associates and patients. But workers should never use unapproved devices or apps, including USBs and third-party tools, to share confidential documents. This behavior is not only unsecure, but it breaks HIPAA Compliance which could lead to loss of accreditation or substantial fines.

HR Departments send offer letters, tax information and payroll data all the time. And if job-seekers use email platforms like Gmail and Yahoo, they further enhance the risk that of content being viewed by a third-party.

Finacial Advisors and

Read more

Adding more DLP to Office365 Subscribe Email Print

DLP provides an automated system to detect when users send out sensitive information. An appropriate action can then be taken, using a Policy tip to warn the user, journal the message, notify a person/group or block the message. Microsoft DLP includes a template engine to create templates for different policies, with a templates for common policies such as HIPAA and PCI. Exchange 2013 DLP suffers from limitations, mainly it worked only on messages sent through the Exchange server, Policy Tip warnings are only supported in OWA 2013 and Outlook 2013, and the system requires specialist skills to maintain.

Microsoft has extended DLP into SharePoint Online and OneDrive for Business. Office 365 DLP will also be able to recognize and act on tags

Read more

Which Office 365 migration tools do you use? Subscribe Email Print

goldfishMicrosoft offers a selection of free Office 365 migration tools to assess readiness and manage deployment. The Exchange Server Deployment Assistant queries deployment objectives and creates guidelines for the migration. The Directory Sync tool assists the migration process by synchronizing users, groups and contact data from local Active Directory to Office 365. Office 365 provides the Exchange Admin Center to help with remote moves, cutovers, staged migrations and third-party email (IMAP) migrations.

Third-party tools can add extra features such as creating user accounts, moving email, contacts, appointments, tasks, folders, archives and settings to Office 365.

Read more

Client Results: 90% Reduction in Successful Phishing Attacks Subscribe Email Print

Reduce employee clicks on phishing attacks by up to 90%security awareness is important, but changing employee behavior to decrease security risk is the end goal of any security education program. 

One of PhishGuru's anti-phishing clients, a Northeastern public university, reduced successful phishing attacks by 90%.

When a cyber-criminal fabricated an email that appeared to originate from the newly appointed dean’s email address, addressing new policies and staffing changes and asking school officials to update their personal information, it triggered an response from administration, according to the school’s information security officer. “We recognized that a significant hole in our security was our people in that they were not very savvy with regards to these issues,” he

Read more

What Moves You To Open An Internal Email? Subscribe Email Print

mailoverloadManagement’s objective is to use email to optimize communications with employees. So what does it take to motivate employees to open internal mail when they are already overloaded with email from clients and business partners?

NCR (via Forbes) came up with some interesting findings on organizational behavior based on big data with regards to emails sent by internal sources…and the factors that motivate click-through vs. the decision not to open an email.

Here are some of the learnings (some may surprise you):

  • Contrary to what it previously thought, NCR found that the day of the week the email is sent doesn’t impact open and click-through rates. Fridays are as good as any other day.
  • The time of day a message is sent does matter.
Read more

The 7 dangers of PST files Subscribe Email Print

#PST files continue to be a thorn in the side of the messaging group, IT security, Compliance and Records Management. Here is an analysis of why you need to get control over your PST files.


PerilsofPSTs

Read more

Add internal compliance to your email Data Loss Prevention strategy Subscribe Email Print

exchange-secure-gatewayThe new SECURE Exchange Gateway (SXG) adds data protection and Compliance control to email content being distributed within an internal Microsoft Exchange infrastructure.

In combination with Adaptive Redaction technology, the SXG safeguards against inappropriate or sensitive information being incorrectly distributed internally thereby removing the threat of such data being stored in an unsecure location or accidentally leaked outside the organization.

Microsoft Exchange, as the primary collaboration tool of choice, will grow market share to 68% by 2016 according to the Radicati Group. The SECURE Exchange Gateway detects inappropriate content sharing, imbedded malware, malicious executable file types and content violations in Exchange

Read more

Adaptive Redaction protects against critical or sensitive data loss Subscribe Email Print

Adaptive Redaction is a new technology to prevent sensitive data leaking in or out of your company via email, attachments and web uploads and downloads. This technology, from our partner Clearswift, automatically identifies and removes sensitive data as it passes in and out of a company network with no human intervention.

Why redact?  Adaptive Redaction scans content, automatically identifying and removing both the ‘visible’ and ‘invisible data’ - credit card number, patient id -  which breaks policy, then continues to deliver to the intended recipient without ‘stopping and blocking’. The trigger to redact depends on the policy, which in turn depends on the individuals who are sending or receiving the information - making it

Read more

Where are you housing your ediscovery data - admins weigh in Subscribe Email Print

A new infographic shows the current situation and plans for ediscovery related data- mailbox data, network file data, hosted or on-premise - from an admins perspective. With 104 respondents,our friends at Sherpaasked IT admins questions pertaining to their ESI (electronically stored information). Here’s what they had to say!

whereareyouhousingyourdatainfographic

 

Read more

Flaws in Sharepoint Library Security Permissions and how to fix them Subscribe Email Print

Most of our Exchange and Domino customers are seeing expanding SharePoint environments. But the management of who-has-access-to-what within a SharePoint Library becomes a huge issue as the SharePoint infrastructure gets larger and more complex. Titus metadata security for SharePoint addresses this issue: 

SharePoint native security issues:SharePoint's Inherited security model is insufficient for controlling access to sensitive information. Permissions for each document within a library must be set one-at-a time, which is very time consuming. It is hard to keep track of all documents that need special permissions. This usually forces organizations to move documents into separate libraries.Users Need Filtered Views - Different users

Read more

Get your electronic discovery together for social media governance and ediscovery Subscribe Email Print

There was a time when the production of information in civil litigation primarily consisted of the exchange of hard-copy, paper records. Those days are long gone.

Now we live in an age that features all kinds of electronic data. It is critical to get it correct when it comes to Electronic Discovery -  as the downside consequences for getting it wrong can be severe.

Duane Morris reports that as soon as litigation happens or is reasonably believed to be on the horizon, it is imperative to implement a "legal hold" to preserve potentially relevant data. In this way, relevant data will not be destroyed. The failure to preserve relevant data can lead to charges of spoliation of evidence. Actual spoliation can lead to court orders excluding

Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up