What LEGO® Can Teach Us About Data Security

February 11th, 2016

LEGO is slippery. I know that statement doesn’t sound like it makes sense and you are probably saying to yourself: “Surely he knows that LEGO blocks interlock and stick together!”

That is true. But, if you have ever used LEGO to build on a hard surface you know that, as you add more bricks to the building you are making, your construction can easily slip around. Unless you are building on a LEGO surface, you can’t always be sure the pieces you are adding won’t cause the structure to slip or tip. The foundation that you build upon makes all the difference to the stability of what you are building.


Read the rest of this entry »

Do the New European Data Protection Regulations Spell the End of the Business Card?

February 3rd, 2016

Ok, the title of this blog sounds bizarre and extreme, but let’s think about it for a while. What are business cards used for?

As a marketing person (for a business to business product) you go to a trade show and talk to people about your product, and you come back with a pile of business cards from people you talked to. Once collected, you enter the information on the card into a database to include them on your next mailer, or pass them on to the lead management team.

cards-blog_image-Feb-Fy16

Read the rest of this entry »

Millennial Privacy – A Paradox?

January 26th, 2016

Each year, International Privacy Day reminds us how important it is to question where sensitive data resides, who has access to it, and how to best value and protect private information. As large enterprises hire the next generation of social media savvy employees, it is also a good time to question whether these millennials understand the value of data. Do they know what information should stay private vs. what can be shared?

Working with a generation that readily connects, collaborates and shares information online, companies are faced with educating employees on balancing the need to share with the need to protect. In an era of digital business, company brand and customer loyalty and retention depend on it.

blog privacy day

Read the rest of this entry »

TITUS Turns 10: Celebrating 10 Years of Keeping Your Data Safe

January 21st, 2016

Ten years ago, I started working at a small Ottawa start-up to help brand their business around the world. Our mission was to provide military and government clients with an easy way to securely share their most sensitive information. Military teams in combat needed a way to share critical information with the right people at the right time despite challenging circumstances, and we became the tool of choice.

Our first customer was a government agency in Australia who purchased the software from us online without us even stepping foot in that market. Today, TITUS has over 3 million users at government, military and enterprise organization around the world in a vast multitude of industries.  They are all using TITUS to identify their business critical information, raise awareness to the sensitivity of data and allow people to share information confidently and securely.

TITUS@10
Read the rest of this entry »

Oh Canada! How a Trip to Ottawa Converted a Data Classification Skeptic into a TITUS Champion

January 14th, 2016

The following blog has been re-posted with permission of the author. The original post can be found on Jeremy Wittkop’s LinkedIn blog.

This will be the rarest of posts. I am going to begin my post about why Data Classification is important to a content and context aware security program by telling you all of the reasons why I was originally skeptical of its value. I do so in hopes that people who share the same concerns I did will have an opportunity to experience the magic of the Titus approach vicariously through me. I am also going to do something that few people who are in my position are willing to do, while simultaneously do something no author should ever do. I am going to admit I was wrong and I am going to quote myself.

“I was wrong” – Me

blog_ottawa
Read the rest of this entry »

3 Steps to Prevent Information From Just Walking Out the Door

January 6th, 2016

We put a lot of resources into data loss prevention, information classification and cyber security projects in an effort to ensure our information is safe. We have developed sophisticated methods of detecting sensitive information and stopping it from being copied over the network, uploaded to the cloud, copied to USB sticks and even burned to DVDs. But there is still one (low tech) leak that seems unstoppable: paper. What is to prevent someone from printing out sensitive information and then taking it out the door or losing control of it in some other way?

blog confidential doc

At first glance it may seem there is nothing we can do, but there are steps that can be taken.
Read the rest of this entry »

TITUS Boxing Day

December 17th, 2015

It’s TITUS Boxing Day today. While traditionally Boxing Day follows Christmas on December 26th, we celebrate a week or so before. We also differ from tradition as the Christmas boxes we prepare are not for our employees, but are boxed by our employees for those in our community who could use some extra help.

Toys for Toy Mountain
Read the rest of this entry »

Regulatory Developments for Cloud Data Privacy

December 9th, 2015

Data privacy in the cloud continues to be a hot topic for regulators. This week, I’d like to cover two important data privacy developments that have a tie-in to concerns about US surveillance programs and cloud data. The first is the US Email Privacy Act, and the second is the revocation of the US-EU Safe Harbor agreement.

Email Privacy Act

The Email Privacy Act is a proposed US Federal law that would require the government to obtain a warrant before accessing email, text messages, and other private content stored in the cloud by Internet Service Providers.

blog_Dec82015
Read the rest of this entry »

Are you ready for NERC CIP v5?

December 2nd, 2015

If your organization is a bulk power system owner or operation in North America, then you probably already know that you need to be compliant with NERC CIP v5 by April 1, 2016.

For readers who are not familiar with the topic, North American Electric Reliability Corporation (NERC) is a not-for-profit international regulatory authority whose mission is to assure the reliability of the bulk power system in North America. NERC develops and enforces Reliability Standards, including Critical Infrastructure Protection (CIP) standards to secure cyber assets essential to the reliable operation of the electric grid.

NERC Image
Read the rest of this entry »

What is “Suggested Classification”?

November 25th, 2015

Last week my colleague Libby Robinson wrote about the enhanced automated classification capabilities of the new TITUS Classification Suite 4.4. While TITUS can automate classification better than ever, Libby nonetheless concluded that: “it is best practice to deploy a combination of user-driven, system suggested and automated classification.” If you read the TITUS blog regularly, I’m sure you are familiar with user-driven classification and its importance to the organization. But what is “system suggested classification” and when would an organization use it?

With “system suggested classification,” the TITUS policy engine runs the same evaluation policies as are performed during the automated classification process (based on content, context, the user, the recipient, etc.). The key difference is that a user is prompted to confirm the automated classification results and is able to quickly adjust the classification if the automated process was deemed incorrect.

Robot-blog_image
Read the rest of this entry »

Search:
Delivered by FeedBurner

Follow Us:

Twitter Twitter You Tube You Tube