Archive for the ‘Email Security’ Category

Classification and the Millennial Workforce

Wednesday, August 19th, 2015

Being born in the 90’s I am “classified” as a millennial, part of “Generation Y” and fully immersed in the world of technology. The majority of people born after 1990 have grown up with computers and the internet. Most of our online experiences started with the reward of being able to play Neopets or Pokémon on our parents’ work computers, and have evolved into devoting hours every day to YouTube, Twitter and Facebook. I am well versed in the art of quickly replying to a text while browsing through multiple websites and watching TV. That being said, sometimes my multitasking leads to mistakes; there have been a fair number of times when I have accidentally sent the wrong information to the wrong people.

(more…)

The Internet of Things and Threat Detection

Wednesday, April 1st, 2015

Marshall McLuhan coined the phrase “the medium is the message” in writing about the social impact of technology. While we are watching the content, we miss the transformative impact the medium has on our lives. Just as the simple light bulb forever changed how we live and work, the Internet of Things—embedded in devices from pacemakers to home thermostats—creates a connectedness we could not have imagined just a few years ago. And it makes us simultaneously free and vulnerable.

At its most basic level, the Internet of Things (IoT) is the interconnection of devices and sensors across the Internet – machines talking to other machines about your health, a refrigerator that keeps track of its contents, and a home security system that monitors your comings and goings.

This free flow of information is both exciting and terrifying. (more…)

Targeting Healthcare Data

Monday, February 9th, 2015

In light of last week’s announcement that the records of 80 million customers were stolen from healthcare insurer Anthem, it is worth noting that healthcare organizations have a particularly heavy data protection burden to bear. As the NY Times reported, Protected Health Information (PHI) is incredibly valuable. Where credit card records were selling for just 33 cents each, a patient medical record on the black market sold for $251.

Why is PHI so valuable?
(more…)

The Sony Hack Highlights the Need for Classification, not Castlefication

Wednesday, December 24th, 2014

The way we do business has changed, which has data security professionals recently speaking a lot about data-centric security. With dispersed, global workforces and the proliferation of mobile devices, it is not possible to keep all of our sensitive data behind the “castle” wall. Data today must be shared, at least some of the time, outside of the citadel of the central network. Data-centric security solutions help organizations properly manage and protect data throughout its lifecycle. If Sony Pictures Entertainment had implemented a data-centric security approach, they likely would not have suffered as severe a breach.

So what is data-centric security? One way to look at data-centric security is to consider it as “data encryption”. (more…)