Will Migrating to Android Limit Access to RMS Protected Documents?

June 16th, 2016

I recently decided to switch from my iPhone to an Android device (LG G4). It wasn’t system functionality that made me switch to Android, but the price (and the ability to swap batteries). However, I now have to face the fact that I have lost some of the functionality I was used to, and some of the apps I used daily. For organizations that have a bring-your-own-device (BYOD) policy like TITUS does, it is important that your business apps support key functionality across platforms.

I often collaborate with colleagues using a Box folder to share files. With TITUS Classification for Mobile, I am still able to access the Box folder from my Android mobile as I had on iOS. Read the rest of this entry »

Five Key Considerations When Starting Your Data Classification Project

June 15th, 2016

In the few short years I have been with TITUS, I have experienced a transition from having to educate organizations about “why classification is important” to explaining how TITUS will make their classification initiative a success. With the rapid growth in the classification market comes some fun dynamics such as new competition, new partnership opportunities and even new ways of looking at the definition of what data classification means.

Data classification was recently added on two different Gartner hype cycles: Information Governance, and Data Security. This suggests there are many ways that vendors position data classification solutions, which can create confusion for those looking to classify their data. Knowing your data is foundational to both information governance and data security; the challenge is knowing if the classification solution you are considering meets both your immediate and future requirements.

Five Key Considerations When Choosing a Classification Solution
Read the rest of this entry »

Lloyds Banking Group Presenting with TITUS at Infosecurity Europe 2016

June 6th, 2016

We’re looking forward to more fun and excitement this week at Infosecurity Europe. TITUS will be presenting, partnering, exhibiting (Stand S50), and generally keeping ourselves as busy as possible! Partners, customers and attendees will have plenty of opportunities to meet with TITUS and learn how our data discovery and classification solutions can help you protect your most sensitive information.

Read the rest of this entry »

Securing Office 365 and the Modern Add-in

May 25th, 2016

Over the past several months, I have spoken with many prospects and partners about Office 365. What I have discovered is that there are as many ideas about what Microsoft Office 365 is as there are people I’ve spoken to. I’ve heard “Office 365” defined as:

  • The desktop product(s) I use today – I pay for it via yearly subscription
  • OneDrive
  • The combination of SharePoint Online and OneDrive
  • Microsoft Office Online apps (Outlook Web Access (OWA), Outlook Online, Office Online)

You’ll see in there a mix of desktop and cloud-deployed products, and the reality is that in the short term you’ll most likely find yourself in a hybrid mode, rather than firmly planted in one or the other. The purpose of this discussion is the modern add-in, though, which only applies to Microsoft Office Online apps.
Read the rest of this entry »

My “Man Drawer” and Me

May 19th, 2016

We all have one… that place in the house or garage that becomes the container of last refuge (or even refuse) for those items we should file in the right place but we haven’t quite gotten around to doing that yet. It could contain an old credit card, some bits of string, important mementoes or other innumerable items that you just don’t know what to do with but somehow can’t throw away. For me, it’s my ‘Man Drawer’—my little haven in the kitchen that much to my wife’s annoyance I don’t allow her to touch, let alone clean-up! I’m not quite sure what’s in it, what’s valuable, what I really should throw away or what I should put in a safer location. It just sits there as the place I stuff things into, and the first place I look when I can’t find something I need.

junkimage-blog
Read the rest of this entry »

For EU GDPR Compliance, Accountability Starts with End Users

May 12th, 2016

I was speaking at an event in Stockholm recently, and was preceded by an eminent lawyer in the field of data protection. He was telling the audience how, after years of discussion, the European Union’s new data protection framework, the EU General Data Protection Regulation, has finally been agreed upon. He gave lots of detail on the specific obligations organisations will now have to comply with to ensure the protection of personal data, but in essence his message boiled down to three things:

• You are accountable and need to be able to demonstrate compliance coherently across your processes, employees and systems
• If you get it wrong, it’s really going to hurt
• You need to start thinking about how to become compliant before it’s too late Read the rest of this entry »

Your Data in the Age of Quantum Computing

May 10th, 2016

Quantum computing promises to be the most profound advance since the invention of electronic computers in the 1930s. Perhaps one could say even since the invention of Babbage’s first mechanical computer in the 1830s because quantum computing offers an fundamentally new paradigm of computing itself.

The idea of quantum computing was brought forth in 1982 by renowned physicist Richard Feynman. He proposed that the superposition principle of quantum physics could be used to create “qubits” (quantum bits) that held different states simultaneously in contrast to regular binary computers in which each bit is only ever either on or off at any point in time. This superposition phenomenon means that quantum computers can be vastly more powerful than binary computers, able to perform some types of calculations in seconds that would take years otherwise, and thus they have unprecedented ramifications for technology and society. (For more details, this excellent video from Microsoft provides a gentle introduction to the physics and potential of quantum computing.)
Read the rest of this entry »

Classification and Organisational Risk

April 13th, 2016

It is a long held view by data classification advocates that the best people to classify data are the end users. After all, they’re the ones who know the content and understand how the data is to be used, right? Yet, some data breaches still happen because users are simply not aware of how sensitive the data truly is, or they don’t fully understand the consequences that disclosure of the data may have to the organisation.

One of the top reasons that customers purchase TITUS Classification Suite is to provide a tool to reinforce their data security education and awareness programs. The user-driven classification approach can be effective as long as your users understand the meaning of the classification labels they are assigning, as well as the definition of sensitive information in the context of your business. Read the rest of this entry »

Search:
Delivered by FeedBurner

Follow Us:

Twitter Twitter You Tube You Tube