Home  //  Tags
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Successful Data Connectors show with Tripwire Subscribe Email Print

Thanks to our friends at Tripwire, Brian Cusack and Sara Monaco for joining Clive Horton of ReSoft at a successful show at Data Connectors NYC today!

dataconnectorsnyc 

 

Read more

Join ReSoft at Data Connectors NYC Show Nov 9th 2017 Subscribe Email Print

Join us and our partner, Tripwire at the the NYC Data Connectors Cybersecurity conference on Thursday, November 9th at New York's Hotel Pennsylvania.  

Entry tickets are free.  https://www.dataconnectors.com/event/new-york-city-11-9-17/

Technology speakers include Sophos, Checkpoint and Mimecast.

Read more

Data Security risks from Millennials vs Baby Boomers Subscribe Email Print

It's 10pm... do you know where your Millennials are?

At that time of night there is a good chance they are at home, working, using a personal device to access corporate data.
 
Millennials (18-35) are the single largest generation in the US workforce; one in three employees is a millennial. By 2025 they will make up 75% of the workforce. This generation is different than the Baby Boomer (55+) generation - life priorities, loyalties, and ways of working, all of which results in Millennials posing the greatest risk to existing corporate data protection practices of any segment of the workforce.
 
The 2015 US Mobile Device Security Report from our partner Absolute Software compares the behavior of Boomers versus Millennials.  
Read more

New report: employee work habits risk data breaches Subscribe Email Print

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
 
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are
Read more

The real data-breach cost of your careless users Subscribe Email Print

Data breaches from employee carelessness can be substantial

The 2015 Cost of Data Breach Study: United States released by IBM and Ponemon Institute is the 10th release focusing on cost of data breaches for US companies. Key findings include the total average cost paid by breached organizations has increased from $5.4 million to $6.5 million. The average cost for a stolen record has increased from $201 to $217, of which $74 represents direct costs and $143 indirect costs.

We have already reported that 90% of security incidents are still be tied back to people behavior, reinforcing the need for employee training and awareness to reduce security incidents and data breaches (whether from lost devices or phishing attacks).

As data
Read more

Key industries need to keep data and email secure Subscribe Email Print

legalEveryday scenarios, highlighted by NetworkWorld magazine, illustrate where sensitive and confidential content and files need to be better managed.

Healthcare practitioners share sensitive files with remote colleagues, associates and patients. But workers should never use unapproved devices or apps, including USBs and third-party tools, to share confidential documents. This behavior is not only unsecure, but it breaks HIPAA Compliance which could lead to loss of accreditation or substantial fines.

HR Departments send offer letters, tax information and payroll data all the time. And if job-seekers use email platforms like Gmail and Yahoo, they further enhance the risk that of content being viewed by a third-party.

Finacial Advisors and

Read more

Add internal compliance to your email Data Loss Prevention strategy Subscribe Email Print

exchange-secure-gatewayThe new SECURE Exchange Gateway (SXG) adds data protection and Compliance control to email content being distributed within an internal Microsoft Exchange infrastructure.

In combination with Adaptive Redaction technology, the SXG safeguards against inappropriate or sensitive information being incorrectly distributed internally thereby removing the threat of such data being stored in an unsecure location or accidentally leaked outside the organization.

Microsoft Exchange, as the primary collaboration tool of choice, will grow market share to 68% by 2016 according to the Radicati Group. The SECURE Exchange Gateway detects inappropriate content sharing, imbedded malware, malicious executable file types and content violations in Exchange

Read more

Adaptive Redaction protects against critical or sensitive data loss Subscribe Email Print

Adaptive Redaction is a new technology to prevent sensitive data leaking in or out of your company via email, attachments and web uploads and downloads. This technology, from our partner Clearswift, automatically identifies and removes sensitive data as it passes in and out of a company network with no human intervention.

Why redact?  Adaptive Redaction scans content, automatically identifying and removing both the ‘visible’ and ‘invisible data’ - credit card number, patient id -  which breaks policy, then continues to deliver to the intended recipient without ‘stopping and blocking’. The trigger to redact depends on the policy, which in turn depends on the individuals who are sending or receiving the information - making it

Read more

Where are you housing your ediscovery data - admins weigh in Subscribe Email Print

A new infographic shows the current situation and plans for ediscovery related data- mailbox data, network file data, hosted or on-premise - from an admins perspective. With 104 respondents,our friends at Sherpaasked IT admins questions pertaining to their ESI (electronically stored information). Here’s what they had to say!

whereareyouhousingyourdatainfographic

 

Read more

Get your electronic discovery together for social media governance and ediscovery Subscribe Email Print

There was a time when the production of information in civil litigation primarily consisted of the exchange of hard-copy, paper records. Those days are long gone.

Now we live in an age that features all kinds of electronic data. It is critical to get it correct when it comes to Electronic Discovery -  as the downside consequences for getting it wrong can be severe.

Duane Morris reports that as soon as litigation happens or is reasonably believed to be on the horizon, it is imperative to implement a "legal hold" to preserve potentially relevant data. In this way, relevant data will not be destroyed. The failure to preserve relevant data can lead to charges of spoliation of evidence. Actual spoliation can lead to court orders excluding

Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up