Home  //  Tags
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Join ReSoft at Data Connectors NYC Show Nov 9th 2017 Subscribe Email Print

Join us and our partner, Tripwire at the the NYC Data Connectors Cybersecurity conference on Thursday, November 9th at New York's Hotel Pennsylvania.  

Entry tickets are free.  https://www.dataconnectors.com/event/new-york-city-11-9-17/

Technology speakers include Sophos, Checkpoint and Mimecast.

Read more

Data Security risks from Millennials vs Baby Boomers Subscribe Email Print

It's 10pm... do you know where your Millennials are?

At that time of night there is a good chance they are at home, working, using a personal device to access corporate data.
 
Millennials (18-35) are the single largest generation in the US workforce; one in three employees is a millennial. By 2025 they will make up 75% of the workforce. This generation is different than the Baby Boomer (55+) generation - life priorities, loyalties, and ways of working, all of which results in Millennials posing the greatest risk to existing corporate data protection practices of any segment of the workforce.
 
The 2015 US Mobile Device Security Report from our partner Absolute Software compares the behavior of Boomers versus Millennials.  
Read more

New report: employee work habits risk data breaches Subscribe Email Print

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
 
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are
Read more

The real data-breach cost of your careless users Subscribe Email Print

Data breaches from employee carelessness can be substantial

The 2015 Cost of Data Breach Study: United States released by IBM and Ponemon Institute is the 10th release focusing on cost of data breaches for US companies. Key findings include the total average cost paid by breached organizations has increased from $5.4 million to $6.5 million. The average cost for a stolen record has increased from $201 to $217, of which $74 represents direct costs and $143 indirect costs.

We have already reported that 90% of security incidents are still be tied back to people behavior, reinforcing the need for employee training and awareness to reduce security incidents and data breaches (whether from lost devices or phishing attacks).

As data
Read more

Using persistence to drive down data-loss from your end-points Subscribe Email Print

wordlossGiven that End-User device loss remains one of the largest contributors to data-loss, one of your biggest challenges after you have rolled out a secure laptop and desktop environment is how do you keep that configuration consistently protected from threats?

Subsequent changes to the employee's computer can easily affect the security of your locked down environment, or worse, your users start to install unauthorized applications like Dropbox on their workstations. Or even worse, they decide to switch off encryption 'just for a while' because it is slowing down the machine.

What is persistence?

Persistence is one of the big attractions to the Absolute Computrace solution. This technology is already embedded in the firmware of most

Read more

Rein in Your 5 high-risk data-loss employee types Subscribe Email Print

headofsecurityOver the past year the number of data breaches has grown significantly, the majority due to internal errors, such as data sent to the wrong email recipient or employees losing an unencrypted device.

Recognize that certain employee bad behaviors are one of the major data-loss threats to your business, which are amplified by Bring Your Own Device, data storage location options and cloud computing.

Your 5 high risk employee types

The Millennial:  Staying connected is rule number one in this employee’s world. Going without WiFi, apps and Social Media is not an option and all personal and corporate information must be available in one place, at their fingertips. Corrupted or hacked, their device is a potential gateway into the business

Read more

Spoofing the Boss for $315,000.. almost Subscribe Email Print

Krebs On security posted an excellent article highlighting the results of socially engineered scams.  The blog discusses “CEO fraud,” and the “business email compromise,” that is increasingly common in targeting a specific businesses working with foreign suppliers businesses that do regular wire transfers.  The FBI warned in January that cyber thieves stole nearly $215 million from businesses in the previous 14 months through these scams, activated by the hijack of  email accounts of business executives.

In one example quoted, the Scoular Company, an employee-owned commodities trader lost $17.2m when they wired money in installments last summer to a bank in China after receiving emails ordering it to do so.

Read more

Employees to IT Security: we are only human Subscribe Email Print

wrongway
 
 
Data loss continues to be a problem for companies across the world, with few CIOs confident about their ability to recover data – many lack a plan to even try.  EMC's  global data protection study reveals data-loss cost enterprises $1.7 trillion in the last 12 months, up by 400% since 2012. 
 
Your people can be one of your best lines of defense given the proper end-user security awareness. They can spot and report suspicious activity in real-time before any triggers get tripped. But they can be a serious risk, prone to social engineering cyber attacks and actual insider threats.
 

While human error is inevitable, employee education and training is critical to protecting your organization; most of your employees understand
Read more

Targeted attacks against businesses are increasing Subscribe Email Print

dollarOver the last year 94% of organizations encountered one or more cyber-security incidents and 12% experiencing a targeted attack.

Damages from a single successful targeted attack could cost a company as much as $2.54 million for enterprises and $84,000 for small businesses, accordong to a survey of worldwide IT professionals by Kaspersky Lab.

Whilst the targeted attacks affects any size of businesse, that large companies specifially see them as an important threat. 38% of organizations with between 1,500 and 5,000 employees, and 39% of businesses with over 50,000 employees highlighted targeted attacks as the number one concern.

Smaller businesses are a little less concerned, 34% citing targeted attacks as a key priority. A big worry for

Read more

Key industries need to keep data and email secure Subscribe Email Print

legalEveryday scenarios, highlighted by NetworkWorld magazine, illustrate where sensitive and confidential content and files need to be better managed.

Healthcare practitioners share sensitive files with remote colleagues, associates and patients. But workers should never use unapproved devices or apps, including USBs and third-party tools, to share confidential documents. This behavior is not only unsecure, but it breaks HIPAA Compliance which could lead to loss of accreditation or substantial fines.

HR Departments send offer letters, tax information and payroll data all the time. And if job-seekers use email platforms like Gmail and Yahoo, they further enhance the risk that of content being viewed by a third-party.

Finacial Advisors and

Read more

Adding more DLP to Office365 Subscribe Email Print

DLP provides an automated system to detect when users send out sensitive information. An appropriate action can then be taken, using a Policy tip to warn the user, journal the message, notify a person/group or block the message. Microsoft DLP includes a template engine to create templates for different policies, with a templates for common policies such as HIPAA and PCI. Exchange 2013 DLP suffers from limitations, mainly it worked only on messages sent through the Exchange server, Policy Tip warnings are only supported in OWA 2013 and Outlook 2013, and the system requires specialist skills to maintain.

Microsoft has extended DLP into SharePoint Online and OneDrive for Business. Office 365 DLP will also be able to recognize and act on tags

Read more

Client Results: 90% Reduction in Successful Phishing Attacks Subscribe Email Print

Reduce employee clicks on phishing attacks by up to 90%security awareness is important, but changing employee behavior to decrease security risk is the end goal of any security education program. 

One of PhishGuru's anti-phishing clients, a Northeastern public university, reduced successful phishing attacks by 90%.

When a cyber-criminal fabricated an email that appeared to originate from the newly appointed dean’s email address, addressing new policies and staffing changes and asking school officials to update their personal information, it triggered an response from administration, according to the school’s information security officer. “We recognized that a significant hole in our security was our people in that they were not very savvy with regards to these issues,” he

Read more

Add internal compliance to your email Data Loss Prevention strategy Subscribe Email Print

exchange-secure-gatewayThe new SECURE Exchange Gateway (SXG) adds data protection and Compliance control to email content being distributed within an internal Microsoft Exchange infrastructure.

In combination with Adaptive Redaction technology, the SXG safeguards against inappropriate or sensitive information being incorrectly distributed internally thereby removing the threat of such data being stored in an unsecure location or accidentally leaked outside the organization.

Microsoft Exchange, as the primary collaboration tool of choice, will grow market share to 68% by 2016 according to the Radicati Group. The SECURE Exchange Gateway detects inappropriate content sharing, imbedded malware, malicious executable file types and content violations in Exchange

Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up