Cyber Hygiene

Cyber Hygiene

by SecureCircle
 | 
March 26, 2020
May 1, 2020
 | 
Blog

Security Risks From Employees Working From Home

Security Risks From Employees Working From Home

by SecureCircle
 | 
March 16, 2020
June 19, 2020
 | 
Blog

More employees are working from home and causing additional security challenges. In a recent Wall Street Journal article citing information concerning Apple.

The Rise Of DASB, Sunset Your DLP

The Rise Of DASB, Sunset Your DLP

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

5 reasons why organizations are switching

Third Party Vendors

Third Party Vendors

by SecureCircle
 | 
February 17, 2020
June 19, 2020
 | 
Blog

Health Share of Oregon, the state's largest Medicaid coordinated care organization, exposed personally identifiable information (PII) of 654,362 of its members, including names, addresses, phone numbers, dates of birth, Social Security numbers, and Medicaid ID numbers.

AWS Source Code Leak

AWS Source Code Leak

by SecureCircle
 | 
February 4, 2020
June 19, 2020
 | 
Blog

Source code breaches are occurring daily with damaging consequences. Uber and Google made headlines when a former Google engineer easily exfiltrated 9 GB of source code and hundreds of Waymo trade secrets. Tesla source code was breached by an employee, exfiltrating over 300,000 files for personal gain. Apple and Samsun

End Source Code Theft

End Source Code Theft

by SecureCircle
 | 
January 28, 2020
August 19, 2020
 | 
Blog

CSC needed to ensure that their source code was not stolen or lost. A costly virtual desktop infrastructure (VDI) solution, was implemented to prevent misuse and add accountability for developers working with source code.

Why Isn’t DLP Preventing Data Breaches?

Why Isn’t DLP Preventing Data Breaches?

by SecureCircle
 | 
January 17, 2020
June 19, 2020
 | 
Blog

Data loss prevention (DLP), the antiquated data protection model, takes a ‘manage by rule’ approach where all data flows freely unless the security team has written a rule to specifically protect the data.

Ransomware stealing data before encrypting

Ransomware stealing data before encrypting

by SecureCircle
 | 
December 18, 2019
June 19, 2020
 | 
Blog

The second flavor of ransomware should only be an annoyance to organizations as a proper backup system should be able to restore to a point in time prior to the ransomware infection.

Insider Threats Infographic

Insider Threats Infographic

by SecureCircle
 | 
December 6, 2019
March 31, 2020
 | 
Blog

Who collected 4 billion records on 1.2 billion users?

Who collected 4 billion records on 1.2 billion users?

by SecureCircle
 | 
December 2, 2019
June 19, 2020
 | 
Blog

Over a week ago, security researchers Vinny Troia and Bob Diachenko uncovered four billion records on 1.2 billion people on an unsecured Elastisearch server.

Macy’s Unhappy Thanksgiving – Unauthorized Application Causes Data Breach

Macy’s Unhappy Thanksgiving – Unauthorized Application Causes Data Breach

by SecureCircle
 | 
November 20, 2019
June 19, 2020
 | 
Blog

With SecureCircle’s DASB, organizations can eliminate unauthorized application threats.

Cisco Systems - Target of Malicious Insiders

Cisco Systems - Target of Malicious Insiders

by SecureCircle
 | 
November 19, 2019
June 19, 2020
 | 
Blog

Cisco Systems sued former senior employees for stealing thousands of files containing confidential information.

New Yorks SHIELD Act

New Yorks SHIELD Act

by SecureCircle
 | 
October 8, 2019
March 31, 2020
 | 
Blog

Insider Threat at Lion Air (Update)

Insider Threat at Lion Air (Update)

by SecureCircle
 | 
September 25, 2019
March 31, 2020
 | 
Blog

How to Prevent the Lion Air Databreach

How to Prevent the Lion Air Databreach

by SecureCircle
 | 
September 20, 2019
March 31, 2020
 | 
Blog

How to Prevent the Mastercard Data Breach

How to Prevent the Mastercard Data Breach

by SecureCircle
 | 
September 6, 2019
March 31, 2020
 | 
Blog

Capital One Hacker Breached 30 Companies Through a Single Cloud Provider

Capital One Hacker Breached 30 Companies Through a Single Cloud Provider

by SecureCircle
 | 
August 29, 2019
May 21, 2020
 | 
Blog

Government Organizations Are Not Ready for Cyberattacks

Government Organizations Are Not Ready for Cyberattacks

by SecureCircle
 | 
August 22, 2019
March 31, 2020
 | 
Blog

How to Prevent the Boeing Data Leak

How to Prevent the Boeing Data Leak

by SecureCircle
 | 
August 13, 2019
March 31, 2020
 | 
Blog

Singapore Overhauling Data Protection Practices

Singapore Overhauling Data Protection Practices

by SecureCircle
 | 
July 24, 2019
March 31, 2020
 | 
Blog

The New Federal Data Strategy

The New Federal Data Strategy

by SecureCircle
 | 
July 10, 2019
March 31, 2020
 | 
Blog

Quest Diagnostics and LabCorp in Trouble

Quest Diagnostics and LabCorp in Trouble

by SecureCircle
 | 
July 6, 2019
March 31, 2020
 | 
Blog

Insider Threat in the Air Force

Insider Threat in the Air Force

by SecureCircle
 | 
July 3, 2019
March 31, 2020
 | 
Blog

How to Combat the Business Email Compromise Scam

How to Combat the Business Email Compromise Scam

by SecureCircle
 | 
May 31, 2019
March 31, 2020
 | 
Blog

How to Prevent Government Data Breaches

How to Prevent Government Data Breaches

by SecureCircle
 | 
May 22, 2019
March 31, 2020
 | 
Blog

Availability Bias in Cybersecurity

Availability Bias in Cybersecurity

by SecureCircle
 | 
May 1, 2019
March 31, 2020
 | 
Blog

How to Minimize Your Exposure to Employee Mistakes

How to Minimize Your Exposure to Employee Mistakes

by SecureCircle
 | 
April 9, 2019
March 31, 2020
 | 
Blog

A Look Inside Toyotas Second Data Breach

A Look Inside Toyotas Second Data Breach

by SecureCircle
 | 
April 3, 2019
March 31, 2020
 | 
Blog

Asymmetric Information Causes Data Breaches

Asymmetric Information Causes Data Breaches

by SecureCircle
 | 
March 6, 2019
March 31, 2020
 | 
Blog

The Financial Consequences of a Data Breach

The Financial Consequences of a Data Breach

by SecureCircle
 | 
February 27, 2019
March 31, 2020
 | 
Blog

Insider Threats Can Happen to Anyone

Insider Threats Can Happen to Anyone

by SecureCircle
 | 
February 20, 2019
March 31, 2020
 | 
Blog

Federal Data Privacy Laws Are Coming

Federal Data Privacy Laws Are Coming

by SecureCircle
 | 
February 13, 2019
March 31, 2020
 | 
Blog

Forget Collection 1: Here comes Collections 2-5

Forget Collection 1: Here comes Collections 2-5

by SecureCircle
 | 
February 6, 2019
March 31, 2020
 | 
Blog

Collection 1: Not a Big Deal?

Collection 1: Not a Big Deal?

by SecureCircle
 | 
January 29, 2019
March 31, 2020
 | 
Blog

It All Adds Up: Better Cybersecurity is a Necessity in 2019

It All Adds Up: Better Cybersecurity is a Necessity in 2019

by SecureCircle
 | 
January 23, 2019
March 31, 2020
 | 
Blog

Why New Year Resolutions Fail

Why New Year Resolutions Fail

by SecureCircle
 | 
January 15, 2019
May 21, 2020
 | 
Blog

9 Costly Security Mistakes

9 Costly Security Mistakes

by SecureCircle
 | 
January 8, 2019
March 31, 2020
 | 
Blog

2019 Security Predictions(Infographic)

2019 Security Predictions(Infographic)

by SecureCircle
 | 
December 11, 2018
March 31, 2020
 | 
Blog

We love what we do - 2018 Review (Infographic)

We love what we do - 2018 Review (Infographic)

by SecureCircle
 | 
December 4, 2018
March 31, 2020
 | 
Blog

Holiday Hacks Are Not Going Away

Holiday Hacks Are Not Going Away

by SecureCircle
 | 
November 29, 2018
March 31, 2020
 | 
Blog

Solving Multi-Cloud Security

Solving Multi-Cloud Security

by SecureCircle
 | 
November 6, 2018
March 31, 2020
 | 
Blog

A better solution than web bugs for internal visibility

A better solution than web bugs for internal visibility

by SecureCircle
 | 
October 30, 2018
March 31, 2020
 | 
Blog

Why File Encryption is not enough - A Customer Conversation

Why File Encryption is not enough - A Customer Conversation

by SecureCircle
 | 
October 23, 2018
March 31, 2020
 | 
Blog

Security, Visibility, and Control

Security, Visibility, and Control

by SecureCircle
 | 
October 16, 2018
March 31, 2020
 | 
Blog

Healthcare Needs a Change

Healthcare Needs a Change

by SecureCircle
 | 
October 9, 2018
May 21, 2020
 | 
Blog

What is old is new: Cold Boot Attacks

What is old is new: Cold Boot Attacks

by SecureCircle
 | 
September 25, 2018
March 31, 2020
 | 
Blog

Inside Information - Data that should NEVER leave the organization

Inside Information - Data that should NEVER leave the organization

by SecureCircle
 | 
September 18, 2018
March 31, 2020
 | 
Blog

Insider Threats

Insider Threats

by SecureCircle
 | 
September 11, 2018
March 31, 2020
 | 
Blog

Opt-Out is more than blocking SPAM

Opt-Out is more than blocking SPAM

by SecureCircle
 | 
August 28, 2018
March 31, 2020
 | 
Blog

What is Opt-Out Data Centric Protection? And why is it so important

What is Opt-Out Data Centric Protection? And why is it so important

by SecureCircle
 | 
August 21, 2018
March 31, 2020
 | 
Blog

Digital Hygiene in a GDPR World

Digital Hygiene in a GDPR World

by SecureCircle
 | 
August 16, 2018
June 19, 2020
 | 
Blog

A year ago, digital hygiene recommendations would have been updating your password, backing up your data, making sure all your apps & operating systems were upgraded.

GDPR Readiness (Infographic)

GDPR Readiness (Infographic)

by SecureCircle
 | 
August 9, 2018
March 31, 2020
 | 
Blog

The Lost Laptop

The Lost Laptop

by SecureCircle
 | 
August 7, 2018
March 31, 2020
 | 
Blog

Reading Between the Lines - The Real Impact of Insider Threat (Infographic)

Reading Between the Lines - The Real Impact of Insider Threat (Infographic)

by SecureCircle
 | 
August 2, 2018
March 31, 2020
 | 
Blog

Protecting Internal Data

Protecting Internal Data

by SecureCircle
 | 
July 31, 2018
May 21, 2020
 | 
Blog

Press & News Embargos

Press & News Embargos

by SecureCircle
 | 
July 24, 2018
March 31, 2020
 | 
Blog

SecureCircle @ CIAB FEBRABAN, Sao Paulo Brazil - The Recap

SecureCircle @ CIAB FEBRABAN, Sao Paulo Brazil - The Recap

by SecureCircle
 | 
July 17, 2018
March 31, 2020
 | 
Blog

California Consumer Privacy (The next generation of GDPR)

California Consumer Privacy (The next generation of GDPR)

by SecureCircle
 | 
July 10, 2018
March 31, 2020
 | 
Blog

I am safe. My data is encrypted. Right?

I am safe. My data is encrypted. Right?

by SecureCircle
 | 
June 26, 2018
March 31, 2020
 | 
Blog

Is my Air Gapped Computer Safe?

Is my Air Gapped Computer Safe?

by SecureCircle
 | 
June 19, 2018
March 31, 2020
 | 
Blog

The Broken 80/20 Rule

The Broken 80/20 Rule

by SecureCircle
 | 
June 12, 2018
March 31, 2020
 | 
Blog

Throw Tech Away - The Rise of a New Generation of Data Security

Throw Tech Away - The Rise of a New Generation of Data Security

by SecureCircle
 | 
June 5, 2018
May 21, 2020
 | 
Blog

Are you ready for a password-less world?

Are you ready for a password-less world?

by SecureCircle
 | 
May 29, 2018
March 31, 2020
 | 
Blog

Account compromised? What about your file content?

Account compromised? What about your file content?

by SecureCircle
 | 
May 18, 2018
May 21, 2020
 | 
Blog

Age old discussion: Convenience versus Security

Age old discussion: Convenience versus Security

by SecureCircle
 | 
May 15, 2018
May 21, 2020
 | 
Blog

Data Protection needs to be agnostic like Switzerland

Data Protection needs to be agnostic like Switzerland

by SecureCircle
 | 
May 9, 2018
March 31, 2020
 | 
Blog

Facebook & Privacy

Facebook & Privacy

by SecureCircle
 | 
March 27, 2018
March 31, 2020
 | 
Blog

Fedex leaks 119,000 Customer Passports & Photo IDs

Fedex leaks 119,000 Customer Passports & Photo IDs

by SecureCircle
 | 
February 16, 2018
March 31, 2020
 | 
Blog

Apple iBoot Source Code in the Wild

Apple iBoot Source Code in the Wild

by SecureCircle
 | 
February 8, 2018
March 31, 2020
 | 
Blog

Tracking Data Leaks

Tracking Data Leaks

by SecureCircle
 | 
February 7, 2018
March 31, 2020
 | 
Blog

Not via Sonic the Hedgehog

Not via Sonic the Hedgehog

by SecureCircle
 | 
January 25, 2018
March 31, 2020
 | 
Blog

DASB Replaces DLP

DASB Replaces DLP

by SecureCircle
 | 
June 19, 2020
 | 
Blog

FSC has been mandated to protect sensitive financial and personal information for mandatory compliance requirements. In particular, FSC wants to protect and track sensitive data as soon as it is accessed from their SQL databases and transformed into flat files stored on their file servers.

What Do Zoom, Dog Walkers, And Encryption Have In Common?

What Do Zoom, Dog Walkers, And Encryption Have In Common?

by SecureCircle
 | 
June 19, 2020
 | 
Blog

The secure solution to grant access to the house without giving up control requires a broker to decide when the door should be unlocked. With today’s modern physical security tools, biometrics grants access.

Modern Encryption from the Beginning : The Split-Key

Modern Encryption from the Beginning : The Split-Key

by SecureCircle
 | 
June 19, 2020
 | 
Blog

Today we can experience a whole new world of encryption due to a man who led the way in cryptography. Thanks to Whitfield Diffie and his invention of public-key cryptography, we started down a path to provide privacy over digital communications and commerce.

Avoid The High Cost Of Data Loss Prevention (DLP)

Avoid The High Cost Of Data Loss Prevention (DLP)

by SecureCircle
 | 
June 19, 2020
 | 
Blog

SecureCircle measures successful implementation in days and weeks. Our customers have complained that DLP and Information Rights Management (IRM) solutions have taken quarters to years to implement, if at all.

DASB Vs. DLP: Operational Overhead

DASB Vs. DLP: Operational Overhead

by SecureCircle
 | 
June 19, 2020
 | 
Blog

By deploying an opt-out, protect by default solution, organizations can reduce the amount of time spent on maintaining DLP solutions and reduce data breaches caused by incomplete, insufficient, outdated, or conflicting policy rules. SecureCircle's DASB prevents data breaches and insider threats.

Securing Source Code & Intellectual Property While Working From Home

Securing Source Code & Intellectual Property While Working From Home

by SecureCircle
 | 
June 19, 2020
 | 
Blog

One of the largest Original Design Manufacturer (“ODM”) companies in the world with design and manufacturing sites worldwide.

Law Firm Leaks Celebrity Data

Law Firm Leaks Celebrity Data

by SecureCircle
 | 
June 19, 2020
 | 
Blog

The New York law firm of Grubman Shire Meiselas and Sacks that serves some of the many well-known celebrities such as Lady Gaga, Madonna, Mariah Carey, and U2 appears to have fallen into a REvil ransomware attack. 

Follow the Data Breach and DLP Money

Follow the Data Breach and DLP Money

by SecureCircle
 | 
June 19, 2020
 | 
Blog

CISOs and IT departments have growing demands and limited budgets. Free up money and resources by selecting the proper DLP solution.

What is Data Loss Prevention?

What is Data Loss Prevention?

by SecureCircle
 | 
June 19, 2020
 | 
Blog

SecureCircle's unique features and overall approach to data loss prevention allow organizations to protect data without impacting end-users or changing business workflow. Organizations can support a wide range of use cases such as accidental and malicious insiders, and more.

Popular App Mathway Leaks Users Records

Popular App Mathway Leaks Users Records

by SecureCircle
 | 
June 19, 2020
 | 
Blog

Mathway, a popular app to assist students with math, suffered a massive data breach. More than 25 million user records have potentially been sold on the dark web by hackers known as the ShinyHunters.

NYPD Privacy Breach

NYPD Privacy Breach

by SecureCircle
 | 
June 19, 2020
 | 
Blog

The New York City council demands an investigation to determine how the mayor's daughter's arrest record was released on Twitter. They believe there are two guilty parties; those who committed the privacy breach from NYPD and those who knew about it and did not notify any city officials.

Healthcare Internal Threat Solution

Healthcare Internal Threat Solution

by SecureCircle
 | 
July 6, 2020
 | 
Blog

The rate of internal threats is on the rise, leaving many organizations at risk. In some industries, they occur way more frequently whether it's accidental or malicious. The healthcare industry is one of the most commonly threatened.

Remote Workforce? Protect Your Data Wherever It Leaks

Remote Workforce? Protect Your Data Wherever It Leaks

by SecureCircle
 | 
August 27, 2020
 | 
Blog

Companies need to enable their teams to work remotely across the world, including work from home. Remote distributed workforces have grown 44% over the last five years.

VPN False Sense of Security

VPN False Sense of Security

by SecureCircle
 | 
July 9, 2020
 | 
Blog

VPNs (Virtual Private Networks) made headlines last week after the National Security Agency (NSA) warned corporations could be vulnerable to cyber-attacks if not correctly secured. The warning comes as organizations adapt to office closures, and employees continue to work from home.

Source Code - Holy Grail of Data Protection

Source Code - Holy Grail of Data Protection

by SecureCircle
 | 
July 15, 2020
 | 
Blog

CISOs and CTOs have almost given up on the idea that protecting the company crown jewels - source code - is possible. Legacy data protection solutions encumbered developers to the point developers refused to work.

Brazil’s Version of GDPR is LGPD

Brazil’s Version of GDPR is LGPD

by SecureCircle
 | 
August 8, 2020
 | 
Blog

Brazil initially passed LGPD (Lei Geral de Proteção de Dados) in 2018 to go into effect in February 2020. The implementation date pushed to August 16, 2020, which is about a month away. Is your company ready?

Secured Files on Adobe Creative Cloud

Secured Files on Adobe Creative Cloud

by SecureCircle
 | 
August 10, 2020
 | 
Blog

Millions of designers rely on Adobe Creative Cloud to share and collaborate with others on their work. Without proper protection, many designers risk their work being leaked to the public. This would allow anyone to view and claim the designs as their own.

Targets on Large Enterprises

Targets on Large Enterprises

by SecureCircle
 | 
July 27, 2020
 | 
Blog

Large enterprises have always been targets for hackers. Most hackers are mainly attracted to the massive amounts of capital and the customer base of large enterprises. According to the 2020 Verizon Data Breach Investigations Report, almost two-thirds of data breaches involved larger enterprises. 

Data Security is Not Data Privacy

Data Security is Not Data Privacy

by SecureCircle
 | 
July 27, 2020
 | 
Blog

Often the terms data security and data privacy are misused or interpreted as the same thing. Since data security and data privacy are both essential components of data protection, it is vital to know the difference between the two. Think about it this way. You protect your house with a door. If the door is glass, does

Cybersecurity Strategies (Infographic)

Cybersecurity Strategies (Infographic)

by SecureCircle
 | 
September 16, 2020
 | 
Blog

The 2020 IBM Security Cyber Resilient Organization Report surveys more than 3,400 IT and security professionals from all over the world to determine their ability to detect, prevent, contain, and respond to cybersecurity incidents.

Hackers Targeting Small Enterprises

Hackers Targeting Small Enterprises

by SecureCircle
 | 
August 4, 2020
 | 
Blog

For an average hacker, small enterprises can be the perfect target. Many small enterprises tend to have less sophistication in their company's cybersecurity or assume that they are too small even to attract hackers.

Making an ROI Case for SecureCircle

Making an ROI Case for SecureCircle

by SecureCircle
 | 
August 6, 2020
 | 
Blog

Many of our customers have budgeted projects to improve or replace existing data protection solutions, so the ROI (return on investment) case has been made upfront.

Garmin Suffers from a Multi-Million Dollar Ransomware Attack

Garmin Suffers from a Multi-Million Dollar Ransomware Attack

by SecureCircle
 | 
August 11, 2020
 | 
Blog

Once again, a massive ransomware attack causes a global outage. Garmin, a sport and fitness tech giant reportedly paid millions of dollars in ransom after shutting down from the attack. The attack put Garmin’s wearables, apps, websites, and call centers offline for several days. The payment was presumed to be around $1

Cost of Data Breaches

Cost of Data Breaches

by SecureCircle
 | 
August 18, 2020
 | 
Blog

With all of the unexpected changes occurring in 2020, some things remain the same. For its 15th year, the Ponemon Institute has conducted research to produce the annual Cost of Data Breach report published by IBM Security. This report provides a detailed view of the financial impacts, and risks security incidents can h

Protecting Data From The Threat of Ransomware

Protecting Data From The Threat of Ransomware

by SecureCircle
 | 
August 20, 2020
 | 
Blog

When engaging with customers, we focus heavily on finding ways to help them on their journey to implementing a Zero Trust security strategy. We often hear concerns about ransomware protection. Our customers tell us that they see value in how we deliver security that persists with data regardless but ask how this helps

Why Legacy DLP Does Not Work

Why Legacy DLP Does Not Work

by SecureCircle
 | 
August 20, 2020
 | 
Blog

In today's world, it is ubiquitous for employees to abandon ship to board another one. It is also common for these employees to take confidential data with them when leaving. Data loss can become very damaging for the company, especially when the employee leaves for a competitor. Three former employers of McAfee left a

Cybersecurity Risks That Come With Remote Learning

Cybersecurity Risks That Come With Remote Learning

by SecureCircle
 | 
September 3, 2020
 | 
Blog

For many students, back to school session is right around the corner. Under the new circumstances of remote learning, students need to become aware of the importance of data security. School districts in the United States already have many cybersecurity shortcomings. Many lack the funding and skilled personnel to provi

Intel Internal Data Leaked By Server Hacker or Third-Party?

Intel Internal Data Leaked By Server Hacker or Third-Party?

by SecureCircle
 | 
September 3, 2020
 | 
Blog

Yet again, another case of leaked data has hit the web. Intel, the largest chipmaker in the United States is investigating a data breach that leaked 20 GB of internal data. The assortment of documents included some marked as confidential, under NDA, and unrestricted secret. Till Kottman, a swift software engineer share