Archive for the ‘Email Security’ Category

Corporate Security and the 2-in-1 Device

Friday, November 13th, 2015

Microsoft seems to have fallen into a pattern where one release of Windows struggles in the market but then the next one succeeds, and back and forth. Windows 8 was one that struggled. Windows 8 came with a new class of Apps, and a new UI called Metro. Unfortunately, people didn’t like it much and they switched to desktop mode fast. True to form, Windows 10 seems to be much more successful. But before we completely dismiss Windows 8, it’s worth thinking about what Microsoft was trying to do with that release and why.

Like a lot of office workers I had a Windows laptop when Windows 8 came out, and I also had an iPad. I was experimenting with leaving the laptop at my desk and only taking the iPad with me when going to meetings or was otherwise away from my desk. After all, it seemed silly to carry two devices when I could present from the iPad, takes note on the iPad, and answer email on the iPad, right?


Cyber Security Awareness Month

Thursday, October 8th, 2015

October is National Cyber Security Awareness Month. This week, the focus is on creating a culture of cyber security at work. For TITUS, helping to create a culture of security is a cornerstone for our solutions.

Implementing digital and technology security solutions within an organization usually involves several components, including secure network gateways, data loss prevention systems, and encryption. But with the rapid explosion of mobile devices that can store gigabytes of data and the easy access to cloud sync and share services, it is difficult for technology and IT teams to keep up and ensure that users are not accidentally leaking sensitive information. It is essential, therefore, that your users understand digital security risks and correct policies for sharing information.

To foster a culture of security, organizations need a solution that will:

The Critical Importance of Protecting Intellectual Property

Wednesday, September 16th, 2015

The value of intellectual property was $329 billion worldwide in 2013, accounting for 1.5% of the $22.2 trillion of the financial flows tracked by the World Trade Organization. In the United States, the $128 billion in intellectual property (royalty and licensing income) generated by US companies accounted for 5.6% of the $2.28 trillion in US exports, making intellectual property revenues second only to food and agriculture exports1. Moreover, given that organizations worldwide lose five percent of their revenue to fraud2, much of it attributable to the theft of intellectual property, protection of this content must be a top priority for any organization.



Classification and the Millennial Workforce

Wednesday, August 19th, 2015

Being born in the 90’s I am “classified” as a millennial, part of “Generation Y” and fully immersed in the world of technology. The majority of people born after 1990 have grown up with computers and the internet. Most of our online experiences started with the reward of being able to play Neopets or Pokémon on our parents’ work computers, and have evolved into devoting hours every day to YouTube, Twitter and Facebook. I am well versed in the art of quickly replying to a text while browsing through multiple websites and watching TV. That being said, sometimes my multitasking leads to mistakes; there have been a fair number of times when I have accidentally sent the wrong information to the wrong people.


The Internet of Things and Threat Detection

Wednesday, April 1st, 2015

Marshall McLuhan coined the phrase “the medium is the message” in writing about the social impact of technology. While we are watching the content, we miss the transformative impact the medium has on our lives. Just as the simple light bulb forever changed how we live and work, the Internet of Things—embedded in devices from pacemakers to home thermostats—creates a connectedness we could not have imagined just a few years ago. And it makes us simultaneously free and vulnerable.

At its most basic level, the Internet of Things (IoT) is the interconnection of devices and sensors across the Internet – machines talking to other machines about your health, a refrigerator that keeps track of its contents, and a home security system that monitors your comings and goings.

This free flow of information is both exciting and terrifying. (more…)

Targeting Healthcare Data

Monday, February 9th, 2015

In light of last week’s announcement that the records of 80 million customers were stolen from healthcare insurer Anthem, it is worth noting that healthcare organizations have a particularly heavy data protection burden to bear. As the NY Times reported, Protected Health Information (PHI) is incredibly valuable. Where credit card records were selling for just 33 cents each, a patient medical record on the black market sold for $251.

Why is PHI so valuable?