How to Overcome Obstacles to Effective Data Security with Data Classification

September 29th, 2016

anca_ciuvar-ns

So, you’ve identified that your information is at risk of being lost or stolen – now what? The most common reaction is to rush the selection and implementation of some kind of technical control(s) to eliminate the risk.

Derek Brink, VP and Research Fellow at Aberdeen Group, points out in his recent report that this “bias towards action” often overlooks two critical components for securing information: identification of data and the definition of clear data handling policies.

email-banner-webinar-aberdeen
Read the rest of this entry »

 

A Culture of Security Across Generations

September 27th, 2016

craig_adams-ns

In the words of Bob Dylan, perhaps one of the most insightful of the 1960s’ poet-musicians “the times they are a-changin’”. The generation he was speaking to then are now today’s retirees. And as one generation moves out of the workforce, another generation is recruited.

The latest generation of employees is generally referred to as “Generation Y” or the “Millennials.” Typically defined as those born after 1979, they are our first truly digital generation, completely at home with the internet, mobile and new modes of working. These are the new graduates, apprentices, office workers and manual labourers that have been joining your workforce for the past 15 years. Millennials have also been referred to as the “echo boomers” due to the huge size of their generation – 16% larger than the boomers. By 2020, it’s estimated that millennials will form almost 50% of the global workforce, and 75% by 2025.

millenials_blog-image
Read the rest of this entry »

 

Introducing Classification for Mac, offering the broadest Outlook coverage on the market

September 14th, 2016

libby_robinson-ns

TITUS is excited to announce the addition of Outlook for Mac to our Classification for Outlook offering!

Email is everywhere.  It’s across various platforms and devices, even within a single organization.  While the majority of users may still be on Windows based computers, more and more are beginning to choose Macs.

According to Aberdeen Research, 20% of organizations have enterprise email installations that include both Windows and Mac. In isolation, this number may not seem particularly large, but often these Mac deployments are on desktops where the most sensitive information resides – primarily executive offices, as well as designers and developers.

If your efforts to secure the information transmitted via email is limited only to certain members of your organization, you are risking breaches of either your own intellectual property (IP), or of PII, PCI or PHI.  You don’t want to spill your secret sauce, or face the possibility of loss of consumer trust, market share, or substantial fines.
Read the rest of this entry »

 

Your Security Ecosystem Isn’t Broken, It’s Missing Classification

September 8th, 2016

erin_pullyblank-ns

Having worked in marketing within companies dedicated to security, I have had the privilege to read numerous reports on the struggles organizations face while trying to protect themselves from breaches and insider threats. The conclusions of these reports all point to the same thing: there is no silver bullet!

Most enterprises have made significant investments (money/time/technology/people) to secure their current environment and to foster programs that facilitate a culture of security. So, when asked to modernize your “legacy” security infrastructures or potentially “rip and replace” particular solutions, you find the idea to be inconceivable from a budgetary and skillset standpoint.

chain-imageblog
Read the rest of this entry »

 

The People, Process & Technology Triangle – Squared with Data

August 31st, 2016

craig_adams-ns

When I joined the IT industry 20 years ago, the theme ‘du jour’ was the People-Process-Technology triangle. It’s a powerful concept that enables organisations to assess and improve their operational efficiency and capability. But the triangle was a child of 90’s and at the dawn of the Information Age. Twenty years on we are in a new digital age, where existing industries are being transformed overnight through revolutionary business models, such as cloud sync and share and mobile-enabled services. To reflect this new reality, the triangle needs to be updated to a square in order to include the currency of our age: data.

triangle-imageblog

Read the rest of this entry »

 

The TITUS Experience

August 26th, 2016

bergen_wilde-ns

During a recent TITUS event, I had the opportunity to listen to a conversation between a deployed customer and another still in the planning phase that highlighted the classification challenges many organizations are facing. The questions being asked of the deployed customer weren’t technical ones, but focused on business transformation, such as:

  • How did you train your users on the meaning of the classification levels?
  • Would you recommend a full-fledged, single phase implementation or break it into several smaller phases?
  • How much did you choose to involve the workers in the application of classification at first?

meeting-blog

Read the rest of this entry »

 

Preparing for EU GDPR

August 18th, 2016

sandra_catana-ns

On 28th May 2018, the European Union (EU) General Data Protection Regulation (GDPR) will come into force with harsh fines and onerous implications. The primary goal of GDPR is to harmonize the protection of personal data across all EU member states. It will have an impact in the EU and around the world, affecting any organization that handles the personal data of EU residents. Don’t let that seemingly distant date delay you from starting to prepare.

TITUS-EU-GDPR-blog
Read the rest of this entry »

 

The Illusion of “Basic” Classification

August 12th, 2016

bergen_wilde-ns

TITUS account executives encounter many organizations – large and small – who believe “basic” classification is enough. They believe that, because they are just beginning with classification, they don’t need a solution as powerful as TITUS and that they can get by with a simple marking tool akin to a digital rubber stamp. Once we probe deeper into these organization’s unique requirements, workflow, and environment we find that “basic” classification is in fact an illusion.

cybersecurty-shortage-blog
Read the rest of this entry »

 

Bridging the Cybersecurity Talent Gap

July 28th, 2016

john_timmerman-ns

Recently, a colleague of mine attended the 2016 CISO Leadership Forum in San Francisco where he had the opportunity to listen to Steve Zalewski, Chief Security Architect for Levi Strauss & Co., discuss the state of his cybersecurity resources. “I don’t need more hammers,” Mr. Zalewski stated, “I need more people to swing them.” The current shortage of cybersecurity experts is creating a “perfect storm” that could spell data disaster for a lot of organizations, both public and private. While cyber threats are growing more sophisticated and dangerous, a recent Cisco report highlights that there are 1 million open cybersecurity positions globally. This is a significant talent gap that is not going to be remedied quickly and is already causing significant difficulties.

So where can a data security team find more people to swing the data security hammers?

cybersecurty shortage
Read the rest of this entry »

 

How Will ‘Brexit’ Impact EU GDPR Compliance?

July 26th, 2016

craig_adams-ns

As a Brit who thinks our country is great, but also a European who spends a large part of his time travelling around the continent, I was shocked to find that the UK electorate voted to leave the European Union! If I’m honest with myself, I didn’t see it coming. My general impression of the British public is that, on the whole, we are conservative with a small “c” and typically vote to maintain the status quo. – the grass is very rarely greener…

Brexit
Read the rest of this entry »