July 14th, 2014
Can you defend your decision to delete data your organization no longer requires? That’s a critical question that every organization must address at some point.
MOST CONTENT SHOULD BE DELETED
A 2012 survey conducted by the Compliance, Governance and Oversight Counsel found that data can be placed into one of four “buckets”:
• At any given time, 1% of data must be retained for litigation holds
• 5% of data must be retained because of regulatory obligations
• 25% of data has some level of business value
• The remaining 69% of data has little or no business value
Consequently, more than two-thirds of data can be safely deleted with little or no consequence. Read the rest of this entry »
July 4th, 2014
It’s happened to you. I know it’s happened to me. I small error in typing an email address, attaching the wrong document to an email, not doing a second check…and click – you’ve just sent something to the wrong person. Oops. For me, it’s never been catastrophic – I might have inadvertently invited one of my friends to a 3pm meeting, causing a bit of confusion – but I’m one of the lucky ones. Read the rest of this entry »
May 29th, 2014
On Tuesday, June 3, TITUS will participate in the Data Risk Management in Financial Services (DRMFS) Summit, taking place at the London Stock Exchange. DRMFS is an international event that brings together heads of security from central banks across the EU, chief information officers (CIO), chief security officers (CSO) as well as regulators, and banking and insurance security specialists to debate internal and external threats to data security. Read the rest of this entry »
May 20th, 2014
Classifying information has always been a common practice for military and government organizations around the world. Back in 2005, when TITUS first began developing email classification software, our first customer was the Australian Federal Government. Read the rest of this entry »
May 14th, 2014
This week, TITUS released an infographic that contains some sobering figures about the true cost of a data security breach. While lost data can mean lost intellectual property (which is hard to place an accurate value on), it most certainly would include fines, expensive customer communications, lawsuits, and an evaluation of technology and/or policy. All totaled, the Ponemon Institute’s 2014 Cost of a Data Breach Study pegs the cost of a lost record in the US at $195 per record – up from $188 in 2013.
Read the rest of this entry »
May 2nd, 2014
Just like that – you snap your fingers, and it’s over! What a great week we had at Infosecurity Europe 2014 in London with non-stop traffic at our booth, great meetings, and loads of interest in our classification solutions for both desktop and mobile. Even the London tube strike couldn’t dampen spirits and keep people from the expo! Read the rest of this entry »
April 21st, 2014
Its great having access to corporate email while my mobile device is offline. If I’m on a plane, or if network access doesn’t work in a particular area, I can still read and reply to my email. But offline access, which is provided via a local database of downloaded email on my phone, can have its risks. If my phone is lost or stolen, all of my email history (whatever period downloaded , Apple Mail defaults to one month) is exposed via this local email.
To reduce this risk, many MDMs offer the ability to wipe lost or stolen mobile phones. But due to slow reporting, the phone may not be wiped for 24-48 hours after the phone is lost. This is the risky period during which the thief can scan the phone for sensitive information. Read the rest of this entry »