We are constantly trying to learn and have a real desire to educate. Browse our blog to see what our experts are talking about, and for insights on the latest cyber security trends impacting your business.
Forbes.com: Data protection solutions are finally evolving to the current state of data: distributed, cloud-centric and always-on. Data used to only exist within the corporate network on devices that never left the physical protection of the company.
The second flavor of ransomware should only be an annoyance to organizations as a proper backup system should be able to restore to a point in time prior to the ransomware infection.
Black Hat Europe 2019 discussed the continuing threat insiders have on organizations. Both malicious and accidental insider threats should be a top priority for all organizations. View some of the highlights in this infographic.
Over a week ago, security researchers Vinny Troia and Bob Diachenko uncovered four billion records on 1.2 billion people on an unsecured Elastisearch server.
With SecureCircle’s DASB, organizations can eliminate unauthorized application threats.
Cisco Systems sued former senior employees for stealing thousands of files containing confidential information.
Standard SecureCircle deployment ensures that sensitive data is only accessible by approved users and devices. This eliminates the need to depend on colleagues to make correct data security decisions.
New York’s governor Andrew Cuomo has signed off on the Stop Hacks and Improve Electronic Data Security (SHIELD) Act.This requires businesses to maintain reasonable safeguards for people’s personal information.
In our last blog post, we discussed the Lion Air data breach, which affected 46 million customers. Lion Air subsidiary, Malindo Air, recently revealed that their data breach was caused by two former contractors.
Indonesian airline carrier Lion Air experienced a data breach that exposed the records of over 35 million customers. Passport information, home addresses, and phone numbers were posted on data exchange forums.
過去幾年,儘管全球資安意識不斷提升,企業 亦不斷添購各類資安防護產品,但都無法有效防堵 資安威脅事件發生,乃至於發生大量商業機密或個 資外洩的事件。然而會造成資料外洩主因
90,000 members of Mastercard’s Priceless Specials program had their data stolen and shared online. After discovering the breach, Mastercard suspended the German program.
Paige Thompson, the suspect in the massive Capital One data breach, was charged with stealing data from over 30 companies. Authorities found hard drives containing multiple terabytes of stolen data at her home.
The Government Accountability Office has released a report outlining the cybersecurity shortcomings in various government organizations. The report found that many organizations had a risk manager in place.
Last September, a security researcher was able to uncover an unprotected server full of code for Boeing’s 787 and 737 passenger jets. While the server should have been locked.
Forbes.com: Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks. Those solutions did not protect information as it moved from one device or medium to another.
After experiencing two high profile data breaches last year, the Singaporean government is looking to overhaul their data protection practices.
SecureCircle announced that Taiwan-based distributor NetBridge Technologies successfully placed SecureCircle onto the CloudMarketplace for government purchases.
The United States government has recently announced that they will be pursuing a new Federal Data Strategy in order to take advantage of the massive amounts of available data.
SecureCircle, the world’s first opt-out data-centric data protection, today announced that UK-based Care21 will serve as a United Kingdom and Europe Middle East Africa Distributor.
Quest Diagnostics recently revealed that about 12 million patients may have had their financial and medical data exposed in a recent breach. This is just the most recent in a string of healthcare data breaches.
Everyone faces the risk of insider threats. Even the Air Force. A couple months ago, police investigated the home of Izaak Vincent Kemp for over 1000 pages of highly classified Air Force documents.
Today, insider threats can be eliminated by adopting data-centric data protection. Legacy data protection solutions focused on networks, endpoints, files and disks.
Data breaches, identity theft, and mass leaking of, well, sensitive photographs hasn't curbed our willingness to store our most sensitive data on the web.
As discussed in many of our previous blog posts, one of the biggest problems that organization’s face today is insider threats. No matter how much you may like them, your employees are sources of threat for your business’ security.
While many companies are experiencing data breaches at an alarming rate, governments must be on high alert as well. The government of Panama just experienced a breach.
When presented with too many choices, people can be paralyzed and pick the one that’s most available to them. This can be either the choice they have heard of the most, or the last option they heard.
The average American worker makes 118 mistakes per year on average. A mistake could range anywhere from tardiness to downloading a virus on their company computer.
Toyota just suffered its second data breach in just over a month with about 3 million customers having their data exposed. Toyota should first perform an internal audit of where their data currently resides and who has access to it.
Data protection solutions have tried to solve the growing data protection needs of organizations of all sizes. Additionally, legacy data protection solutions have followed the discover, classify and protection mindset.
Even though you may trust the people to not maliciously use your data, there is still the chance that they could accidentally expose it.
SecureCircle, the world’s first opt-out data-centric data protection, today announced the availability of SecureCircle version 2.5 that introduces agentless secure collaboration via Send Secure.
A recent study has found that 62% of Americans will stop buying things from a company for a few months after a data breach. This number seems incredibly high and probably doesn’t manifest itself in reality.
If one of your employees leaves today, do they have the ability to take sensitive information with them? Chances are that the answer is yes.
Today’s business environment is littered with regulations regarding the protection of consumer data. Many are created to be industry specific such as HIPAA or PCI DSS.
In case you missed it, here’s a quick recap of the Collection 1 data breach. Over 700 million emails and passwords were exposed on a Megaupload server.
Data protection and privacy have been headlines for years without any significant pushback from cybersecurity vendors. Solutions were based on endpoints or networks.
The news broke last week that the “largest data breach ever” had been discovered on a MegaUpload server. Over 700 million emails and passwords were exposed in this breach.
The likelihood of a data breach for an organization last year was 44%.That coupled with an average cost of $3.86 million globally, leads to some very scary numbers.
New year, new me.The phrase represents a chance to start over. The only problem is that many people don’t take advantage of it.
9 Costly security mistakes that every company should avoid.
Computing at the edge brings greater mobility, flexibility, convenience and other benefits to organizations, but at the same time, poses greater risks for cybersecurity professionals.
SecureCircle's Security Predictions for 2019 Infographic demonstrates the increased visibility, larger data breaches, and how more is not always better.
SecureCircle's 2018 review. Infographic on our product, customers, expansion, awards, success, business, connections, and education.
By implementing access control best practices to manage identities and access and data encryption, you will have strong weapons in your arsenal to fight cyber threats.
Yesterday marked the peak of the holiday season surge in cyberattacks. Cyber Monday typically results in huge amounts of phishing attacks on consumers and businesses everywhere.
IT is moving to the cloud. This trend will continue as the cloud provides too many advantages for customers to ignore: reliability, scalability, and an efficient cost model.
Utilize SecureCircle to monitor file access is much more robust than web bugs. It works with any file type and won’t be blocked by a browser or operating system privacy settings.
After the initial SecureCircle sales explanation, a customer explained that they use Vendor ABC file encryption solution and that is working well. The customer was not aware File Encryption is only useful to protect data in transit.
The initial sales pitch for SecureCircle is protection. Secure your data regardless of location including on-premise file servers, edge devices like phones and laptops, as well as public and private cloud storage.
SecureCircle, the world’s first opt-out data protection, today introduced an updated product offering with new features to meet the data security needs of cloud-first enterprises in a zero trust world.
According to the Ponemon Institute, 90% of healthcare organizations have experienced a data breach within the last two years. This is an astounding statistic for many reasons.
Cold boot attacks have been around for a decade and steal information stored on a computer that hasn’t been shut down properly or left in a vulnerable sleeping state.
Accidentally leaving servers unprotected without a password, losing a laptop with unencrypted data, emailing sensitive data to the wrong person, malicious phishing and data hacks.
SecureCircle, a provider of always-on, opt-out cybersecurity data protection, today announced that Taiwan-based NetBridge Technologies will serve as its Asia Pacific distributor.
Insider threats make up 43% of all data breaches. This is a very real problem for organizations in any industry. With new regulations such as GDPR and privacy laws, companies should know where their data resides.
If you can anticipate how employees will work, you’ll have a better shot of preemptively preparing for it and protecting your critical data.
Consumers are aware of the opt-in and opt-out terminology related to whether companies can send emails and postcards explaining their latest products or what products are on sale at this moment.
Data-centric is a hot buzzword in the security world right now. A data-centric security approach highlights the security of the data itself instead of network, server, or application security.
A year ago, digital hygiene recommendations would have been updating your password, backing up your data, making sure all your apps & operating systems were upgraded.
A new, innovative approach is the only guarantee of true security. In today’s data-driven world, the stakes are too high for a data breach. And time is of the essence, as hackers are continually inventing new ways to steal data.
SecureCircle GDPR Readiness Infographic. What is GDPR and how SecureCircle helps achieve compliance in each phase.
Each lost or stolen laptop costs a company almost $700,000 according to a 2003 BSI study on computer theft. This number is likely even higher now due to more data collection.
SecureCircle CEO Jeff Capone explains the four key vulnerabilities of the traditional opt-in model and how to implement an opt-out data security model.
SecureCircle's reading between the lines, the real impact of insider threats infographic. Insider threats can have a profound impact on an organization.
Every day organizations make headlines for data leaks. Accidentally leaving servers unprotected without a password, losing a laptop with unencrypted data, emailing sensitive data to the wrong person, malicious phishing and data hacks.
There are all sorts of news content embargoed for various reasons. Common embargos are new product announcements, advertising campaigns, and quarterly financial reports.
GDPR became the law of the land in Europe on May 25th. The impact has been felt across the globe… Who’s benefiting? Who’s suffering?
CIAB FEBRABAN – Information Technology Congress and Exhibition of Financial Institutions contributes to the evolution of the sector and generates business opportunities for participants.
Starting with complaints filed against Facebook and Google for non-compliance and ending with US newspapers removing their content from European eyes completely rather than risk the large GDPR fines.
A common misconception is that encryption by itself means the data is secure. In a previous blog post, we used the door and lock analogy. Building on that analogy, encryption is like having a lock for your data.
A typical security measure to prevent access to extremely sensitive data is to air gap the machines accessing the data, so the machines are not connected to external networks including the Internet.
The University of Texas MD Anderson Cancer Center violated the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules and granted summary judgement.
The 80/20 rule, also known as the Pareto Principle, states for many events, roughly 80% of the effects come from 20% of the causes.
SecureCircle and Fiandeira Tecnologia will be joining the largest information technology congress for the financial sector in Brazil, CIAB FEBRABAN, to be held at Transamerica Expo Center, in São Paulo.
Technology develops so rapidly. Deloitte’s Tech Trends 2018 summarized “In many companies, IT’s traditional delivery models can no longer keep up with the rapid-fire pace of technology innovation and the disruptive change it fuels.”
After a year of researching, interpreting and understanding the GDPR compliance, the day of action has come and passed. However, many companies are still struggling to gain compliance requirements.
Even with the availability of password managers, users continue to use weak passwords. Similarly, users use the same password for every account.
People should be the last thing in charge of cybersecurity. Remove people and add transparency and automation for true protection.
A member of hacking group Crackas With Attitude (CWA) told Motherboard at the time that breaking into the account was “not hard at all” and that “a five-year-old could do it.”
The struggle between convenience and security is as simple to understand as a door and door with a key lock.
There is no place – internally or externally – or type of data that is safe. If we embrace that truth, then we won’t be lulled into a false sense of security.
SecureCircle’s patent-pending Transparent File Encryption solution is designed to transparently protect unstructured data in any form.
SecureCircle was honored for the Govies Awards in the category of encryption.
It’s a [Zero Trust] world where we can’t count on the security of our internal or external networks and instead need to change our mindset about how we think about safeguarding data.
A thorough data security solution needs to be all encompassing and cannot limit protection to a subset of content. Data security should not be restricted by file size, application, location, device, or file type.
SecureCircle was honored for the SecureCampus Award for their ability to improve campus security
It’s probably not surprising that WordPress powers 30% of the internet. But you may be surprised to learn that, at the time of this writing, over 2,300 websites run on WordPress were infected by malware.
Don’t just pick and choose data and documents to protect: secure unstructured data, too.
SecureCircle, which he co-founded in 2015. An award-winning executive leader with expertise in enterprise software development, network and storage solutions, and IoT applications.
SecureCircle, a leader in unstructured data security for cloud-first enterprises, today announced that it has earned platinum and gold awards for its flagship product, SecureCircle.
SecureCircle, a leader in unstructured data security for cloud-first enterprises, today announced three new channel partners, contributing to the startup’s growth.
Privacy should be a primary concern of everyone that uses the internet, not just organizations with compliance mandates.
In today’s version of headlines that should never occur. FedEx left scanned customer passports, drivers licenses, and other documentation on a publicly accessible Amazon S3 server.
Today’s story involves the iBoot source code for iOS 9 being leaked on GitHub. GitHub is a software development site/tool for collaboration, version control, and general source code management.
A big news story this week is the trial of Uber vs. Waymo. Waymo, a subsidiary of Google parent company Alphabet, is claiming Uber stole proprietary information.
There are over 2M apps available on each of the mobile app platforms: Google Play and Apple App Store. How thoroughly are those apps tested?
SecureCircle, a leader in unstructured data security for cloud-first enterprises, today announced that industry veteran Ted Plumis is the newest addition to its advisory board.
Differing from other Data Security and Access Control solutions, SecureCircle automatically detects and transparently protects data no matter the form it takes throughout its lifecycle.