The value of intellectual property was $329 billion worldwide in 2013, accounting for 1.5% of the $22.2 trillion of the financial flows tracked by the World Trade Organization. In the United States, the $128 billion in intellectual property (royalty and licensing income) generated by US companies accounted for 5.6% of the $2.28 trillion in US exports, making intellectual property revenues second only to food and agriculture exports1. Moreover, given that organizations worldwide lose five percent of their revenue to fraud2, much of it attributable to the theft of intellectual property, protection of this content must be a top priority for any organization.
Archive for the ‘Information Spillage’ Category
Mobile devices make it easy to access information from almost anywhere and to share it with just about everyone on earth. However, by their nature as small and highly portable, mobile devices are also more easily lost or stolen—and with them—the data they contain. For businesses, governments, militaries and other organizations that create and deal with sensitive information, mobile devices pose a huge security risk. While there are many solutions designed to protect data on mobile devices, what if you could delete sensitive data from the device before it is put at risk?
It’s Data Privacy Day today, and TITUS is participating with other organizations around the world to raise awareness about the need to protect personal data. While much of the focus of Data Privacy Day is on how individuals can protect their data from the mischievous, the opportunist and the criminal, here at TITUS we like to look at it from the other side. How can the bank, the clinic, the department store, the utility, the educational institution, and all of the other legitimate organizations that collect personal details be good stewards of this information?
As the workforce becomes more mobile, enterprises wishing to facilitate a productive mobile workforce need to ensure that their workers have access to information. This means that mobile users must download and share information that could be detrimental to the organization if it is acquired by an outside agent. Yet, almost weekly we hear of another major breach of an organization’s central security perimeter. If the central data vault can be compromised, it raises the question: how safe is your data on mobile devices?
Mobile devices share information over public networks and they make it easy for users to share information with public cloud storage services. Worse still, they are easily lost or stolen. It makes a lot of sense, then, to leverage a tool like Microsoft Rights Management Services (RMS) to encrypt your most sensitive data—especially when it is shared with mobile users.
A few years back my wife and I spent a great deal of time and effort writing a business plan. We researched the market place, analyzed the threat from local competitors and built the financial and resourcing plans that would ensure our success. When we were done, we shared the plan with our potential investors (friends and family).
Happily, when we shared our plan it received an enthusiastic response. Unhappily, it was so well received that one of our friends thought to share our business plan with some of his work colleagues.
On October 7, 2011 President Obama issued an Executive Order (Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information) “in order to ensure the responsible sharing and safeguarding of classified national security information (classified information) on computer networks”. This is as a result of the Wikileaks incident of last year. One of the major focus areas of the Executive order is to reduce the possible threat of insiders leaking classified information out of the government.