TITUS continues to prove itself as the leader in data classification and governance solutions with the release of the very first product on the market that has the ability to provide data classification capabilities to Microsoft Outlook Web App (OWA) 2013. The latest release of TITUS Message Classification for Microsoft OWA includes patent-pending technology that will ensure our customers, including the Government of Canada, have the most up-to-date and complete classification solution available.
Archive for the ‘Classification’ Category
Well, there’s one thing that you can say about the mobile tsunami — it has generated a LOT of acronyms. BYOD, CYOD, COPE, MDM, MAM, MIM, MCM… the list goes on.
One of the newest is “EMM” or Enterprise Mobility Management. The cynic might argue that EMM is just a way for mobile security vendors to sell more of their products by bundling Mobile Device Management, Mobile App Management, and Mobile Content Management into one “must have” über-mobile security solution called EMM. Perhaps they’re right, but mobile security is a significant challenge and making sure that all areas are covered makes it all the more challenging.
Without question, one of the most important trends in IT during the past few years has been the shift to mobile computing – the use of smartphones and tablets to access business email, to read and edit corporate documents, to access corporate applications, and to communicate and collaborate with others in real time. In fact, Osterman Research has found that 33% of the typical information worker’s time is spent doing work on a mobile device, and 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices. (more…)
This week, TITUS released an infographic that contains some sobering figures about the true cost of a data security breach. While lost data can mean lost intellectual property (which is hard to place an accurate value on), it most certainly would include fines, expensive customer communications, lawsuits, and an evaluation of technology and/or policy. All totaled, the Ponemon Institute’s 2014 Cost of a Data Breach Study pegs the cost of a lost record in the US at $195 per record – up from $188 in 2013.
Effective April 2, 2014, the new UK Government Security Classifications (GSC) policy replaces the previous Government Protective Marking Scheme (GPMS). The new policy requires the classification of Her Majesty’s Government (HMG) information assets into one of three types: OFFICIAL, SECRET, and TOP SECRET. This classification scheme, simplified from the previous GPMS seven-level classification scheme, will help ensure that government staff, contractors, and service providers can more easily safeguard information.
I’ve noticed a distinct theme throughout a number of different analyst report I’ve recently read – that the protection of information and data assets is a business task which needs guidance from the business unit leaders. Take as an example…
As executives see more and more media coverage of data breaches and security incidents, the inevitable question is: “What are we doing to make sure that doesn’t happen to us?”
Contrary to 2012 when privacy responsibility was shifting to an organization-wide accountability, in 2013 it’s falling more onto the security group within enterprises. [It’s] a matter of concern if more and more enterprises deem the security group fully responsible for privacy and regulations. Ensuring privacy requires a union of technology, policy, and culture, and a harmony between many business units from security to legal to HR to employees.