Around our office there is a lot of talk about “hybrid Cloud” as we help our customers create strategies to safely migrate from on-premise to cloud storage and applications. A hybrid cloud strategy provides both flexibility and peace of mind, enabling organizations to ease into utilizing the Cloud at their pace. The actual challenge however is not finding the right balance between on-premise and the Cloud, but coping with the multitude of cloud options.
We often talk to our customers and prospective customers about the various benefits of using classification, such as stopping the malicious insider, ensuring your sensitive information is secure, keeping internal information from inadvertently leaking, and many more.
But, what about the basics? What about the dreaded ‘reply all’?
Generally, we think about ‘reply all’ incidents as a source of embarrassment and potentially an information leak. But not every ‘reply all’ scenario impacts your reputation. I’m talking about the scenario of hitting reply all…and there are 840,000 colleagues on the distribution list. Uh oh…
My 3-year-old daughter is fortunate enough to have great-grandparents in her life who play with her and tell highly amusing anecdotes detailing the differences between her life and theirs when they were children. Something struck me recently – when they are gone, there will be no one in her life who has lived through a world war.
My own grandfather used to tell my brother and me war stories that sounded like they were out of the movies – to our young ears they sounded incredible. My grandfather, Wing Commander at 24, awarded the Distinguished Service Order (DSO) and Distinguished Flying Cross (DFC) from the RAF as well as an American DFC; the war hero, the tough guy. My heart would swell with pride when I spoke about him.
As enterprises embrace a digital transformation strategy, they are innovating how they collaborate with and share data. Leading this charge for enterprises around the world is Box, and today TITUS is excited to be one of the partners included in their journey with security classification for Box Governance!
My colleague Libby Robinson recently provided an overview of the benefits and insights built-in TITUS reports can provide. However, during my 16-year career in security & analytics, I have also come to appreciate working with a dedicated data reporting system. If you are like me, you enjoy having the flexibility to precisely control reporting logs in order to present the data exactly the way you want using your preferred tools. TITUS recognizes that there are not only “do it yourselfers” like me, but also different SIEM, business intelligence and insider threat detection systems that organizations rely on. TITUS log data provides unique insights into how users are working with your most sensitive information – so feeding this data into third party reporting systems will provide your organization with insights not otherwise available.
Part of the preparation to purchase any software requires some requirements analysis. What am I hoping to get from this? What benefits am I looking for? We go through RFIs, RFPs, POCs, and diligently map our requirements to the solution before making our decision.
But, once purchased and put into place, how do you measure the effectiveness of your investment?
The end goal of implementing a data classification solution is to help ensure that your sensitive data is secure and that both users and automated processes make the right sharing and handling decisions. The ability to monitor the usage of your classification solution (the trends in user behavior, the success of deployment, the machine health) is vital to ensuring you are getting the most out of your investment.
So, you’ve identified that your information is at risk of being lost or stolen – now what? The most common reaction is to rush the selection and implementation of some kind of technical control(s) to eliminate the risk.
Derek Brink, VP and Research Fellow at Aberdeen Group, points out in his recent report that this “bias towards action” often overlooks two critical components for securing information: identification of data and the definition of clear data handling policies.
In the words of Bob Dylan, perhaps one of the most insightful of the 1960s’ poet-musicians “the times they are a-changin’”. The generation he was speaking to then are now today’s retirees. And as one generation moves out of the workforce, another generation is recruited.
The latest generation of employees is generally referred to as “Generation Y” or the “Millennials.” Typically defined as those born after 1979, they are our first truly digital generation, completely at home with the internet, mobile and new modes of working. These are the new graduates, apprentices, office workers and manual labourers that have been joining your workforce for the past 15 years. Millennials have also been referred to as the “echo boomers” due to the huge size of their generation – 16% larger than the boomers. By 2020, it’s estimated that millennials will form almost 50% of the global workforce, and 75% by 2025.
TITUS is excited to announce the addition of Outlook for Mac to our Classification for Outlook offering!
Email is everywhere. It’s across various platforms and devices, even within a single organization. While the majority of users may still be on Windows based computers, more and more are beginning to choose Macs.
According to Aberdeen Research, 20% of organizations have enterprise email installations that include both Windows and Mac. In isolation, this number may not seem particularly large, but often these Mac deployments are on desktops where the most sensitive information resides – primarily executive offices, as well as designers and developers.
If your efforts to secure the information transmitted via email is limited only to certain members of your organization, you are risking breaches of either your own intellectual property (IP), or of PII, PCI or PHI. You don’t want to spill your secret sauce, or face the possibility of loss of consumer trust, market share, or substantial fines.
Read the rest of this entry »