Archive for the ‘Classification’ Category

Ready for Windows 10

Wednesday, July 29th, 2015

For the past 3 years I have been bouncing between four operating systems on four different devices: my iPhone (iOS), my Nexus tablet (Android) my home PC (Windows 7) and my work PC (Windows 8.1). Today, with the launch of Windows 10, I dare to hope that this user interface nightmare is coming to an end. The device will finally become secondary to continuity, usability and productivity. As Microsoft themselves say: “We believe your experiences should be mobile – not just your devices. Technology should be out of the way and your apps, services and content should move with you across devices, seamlessly and easily.”1 So, how does TITUS fit into the Windows 10 world?

Perfectly. (more…)

Tackle Your Insider Threat: Protect Your Information and Organization

Tuesday, May 12th, 2015

Last week we featured an excellent blog by Mike Osterman, President of Osterman Research, focused on the threat to data security posed by insiders. As the business world gets more mobile and collaborative, the risks that insiders pose to information security increases. With cloud storage apps, thumb drives, and mobile devices that contain a great deal of corporate information but are also easily lost or stolen, your users can leak huge volumes of your critical data quickly – and so far I am just talking about mistakes by good employees. When you consider employees that have gone bad and are stealing information for financial gain, prevention and detection of insider data leaks becomes critical.
(more…)

Policy Tetris

Wednesday, April 8th, 2015

Remember Tetris? Admit it – you’ve wasted hours on Tetris. Well, let me share with you something I like to call “Policy Tetris.”

(more…)

The Internet of Things and Threat Detection

Wednesday, April 1st, 2015

Marshall McLuhan coined the phrase “the medium is the message” in writing about the social impact of technology. While we are watching the content, we miss the transformative impact the medium has on our lives. Just as the simple light bulb forever changed how we live and work, the Internet of Things—embedded in devices from pacemakers to home thermostats—creates a connectedness we could not have imagined just a few years ago. And it makes us simultaneously free and vulnerable.

At its most basic level, the Internet of Things (IoT) is the interconnection of devices and sensors across the Internet – machines talking to other machines about your health, a refrigerator that keeps track of its contents, and a home security system that monitors your comings and goings.

This free flow of information is both exciting and terrifying. (more…)

What If “Big Brother” Was Watching Your Data?

Wednesday, March 25th, 2015

Edward Snowden was in the news again this month, speaking (via teleconference from Russia of course) at an event hosted by Ryerson University in Toronto, Canada. Apart from the designated topic of classified government documents making their way into public hands, the concept of communications privacy was broached by the famous ‘whistle-blower’.   Mr. Snowden said that he himself avoided any digital communications “for anything that could be considered sensitive just because it’s extremely risky” and framed these thoughts with a series of software tools he recommended to protect the privacy of your data.
(more…)

Do Newborns Really Need a Name? The Top 10 Reasons Organizations are Not Naming Their Data Babies

Wednesday, March 11th, 2015

Think about this…on that special day when we are born our parents give us a name. Makes sense, right? Having a name keeps you from getting mixed up with the other babies. If you are late for supper and your mom needs to find you right away, she calls your entire name just to make sure the right “Mike” comes home. Should you get lost, it would be pretty difficult for your parents to say to police: “Well, he is 7 years old but doesn’t have a name. See if he answers to ‘Steve’. We always liked that name…”

I digress…

Your company’s data isn’t much different, is it? Without a unique identifier your sensitive data is subject to misuse or improper handling. Everything from securing, storing and retrieving your information is much more difficult, time consuming, and less efficient without first properly identifying—or classifying —your data.

Many organizations are beginning to see the value in “naming their data”, or data classification, and are starting to do something about. However, there are still some organizations out there that do not classify their data. Here is a top 10 list of excuses why organizations DO NOT classify their data “babies”.
(more…)

A Zero Trust Network Demands Data Classification

Wednesday, March 4th, 2015

Think fast – your house is on fire and you only have time to run in once to grab the valuables.

What do you grab?

Most people would (hopefully) grab, in this order, their children, pets, and then—if there is time—family heirlooms and personal/financial documents. But this assumes that you know the location of your belongings, and that they were not left in flammable areas. The same holds true when talking about enterprise data. There are data “arsonists” running around with lighters and matches, trying to ignite your data and leave you with a singed reputation and charred bottom line.
(more…)