Home  //  Tags
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Successful Data Connectors show with Tripwire Subscribe Email Print

Thanks to our friends at Tripwire, Brian Cusack and Sara Monaco for joining Clive Horton of ReSoft at a successful show at Data Connectors NYC today!

dataconnectorsnyc 

 

Read more

Join ReSoft at Data Connectors NYC Show Nov 9th 2017 Subscribe Email Print

Join us and our partner, Tripwire at the the NYC Data Connectors Cybersecurity conference on Thursday, November 9th at New York's Hotel Pennsylvania.  

Entry tickets are free.  https://www.dataconnectors.com/event/new-york-city-11-9-17/

Technology speakers include Sophos, Checkpoint and Mimecast.

Read more

Data Security risks from Millennials vs Baby Boomers Subscribe Email Print

It's 10pm... do you know where your Millennials are?

At that time of night there is a good chance they are at home, working, using a personal device to access corporate data.
 
Millennials (18-35) are the single largest generation in the US workforce; one in three employees is a millennial. By 2025 they will make up 75% of the workforce. This generation is different than the Baby Boomer (55+) generation - life priorities, loyalties, and ways of working, all of which results in Millennials posing the greatest risk to existing corporate data protection practices of any segment of the workforce.
 
The 2015 US Mobile Device Security Report from our partner Absolute Software compares the behavior of Boomers versus Millennials.  
Read more

New report: employee work habits risk data breaches Subscribe Email Print

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
 
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are
Read more

The real data-breach cost of your careless users Subscribe Email Print

Data breaches from employee carelessness can be substantial

The 2015 Cost of Data Breach Study: United States released by IBM and Ponemon Institute is the 10th release focusing on cost of data breaches for US companies. Key findings include the total average cost paid by breached organizations has increased from $5.4 million to $6.5 million. The average cost for a stolen record has increased from $201 to $217, of which $74 represents direct costs and $143 indirect costs.

We have already reported that 90% of security incidents are still be tied back to people behavior, reinforcing the need for employee training and awareness to reduce security incidents and data breaches (whether from lost devices or phishing attacks).

As data
Read more

Adaptive Redaction protects against critical or sensitive data loss Subscribe Email Print

Adaptive Redaction is a new technology to prevent sensitive data leaking in or out of your company via email, attachments and web uploads and downloads. This technology, from our partner Clearswift, automatically identifies and removes sensitive data as it passes in and out of a company network with no human intervention.

Why redact?  Adaptive Redaction scans content, automatically identifying and removing both the ‘visible’ and ‘invisible data’ - credit card number, patient id -  which breaks policy, then continues to deliver to the intended recipient without ‘stopping and blocking’. The trigger to redact depends on the policy, which in turn depends on the individuals who are sending or receiving the information - making it

Read more

Where are you housing your ediscovery data - admins weigh in Subscribe Email Print

A new infographic shows the current situation and plans for ediscovery related data- mailbox data, network file data, hosted or on-premise - from an admins perspective. With 104 respondents,our friends at Sherpaasked IT admins questions pertaining to their ESI (electronically stored information). Here’s what they had to say!

whereareyouhousingyourdatainfographic

 

Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up