Archive for the ‘Uncategorized’ Category

Can you defend your decision to delete data?

Monday, July 14th, 2014

Can you defend your decision to delete data your organization no longer requires? That’s a critical question that every organization must address at some point.

A 2012 survey conducted by the Compliance, Governance and Oversight Counsel found that data can be placed into one of four “buckets”:

• At any given time, 1% of data must be retained for litigation holds
• 5% of data must be retained because of regulatory obligations
• 25% of data has some level of business value
• The remaining 69% of data has little or no business value

Consequently, more than two-thirds of data can be safely deleted with little or no consequence. (more…)

And, Send…Oops…

Friday, July 4th, 2014

It’s happened to you. I know it’s happened to me. I small error in typing an email address, attaching the wrong document to an email, not doing a second check…and click – you’ve just sent something to the wrong person. Oops. For me, it’s never been catastrophic – I might have inadvertently invited one of my friends to a 3pm meeting, causing a bit of confusion – but I’m one of the lucky ones. (more…)

Financial organizations turn to classification to enforce policy and mitigate data loss

Thursday, May 29th, 2014

On Tuesday, June 3, TITUS will participate in the Data Risk Management in Financial Services (DRMFS) Summit, taking place at the London Stock Exchange. DRMFS is an international event that brings together heads of security from central banks across the EU, chief information officers (CIO), chief security officers (CSO) as well as regulators, and banking and insurance security specialists to debate internal and external threats to data security. (more…)

Why More and More Enterprises are Turning to Classification

Tuesday, May 20th, 2014

Classifying information has always been a common practice for military and government organizations around the world. Back in 2005, when TITUS first began developing email classification software, our first customer was the Australian Federal Government. (more…)

What is the True Cost of a Data Breach?

Wednesday, May 14th, 2014

This week, TITUS released an infographic that contains some sobering figures about the true cost of a data security breach. While lost data can mean lost intellectual property (which is hard to place an accurate value on), it most certainly would include fines, expensive customer communications, lawsuits, and an evaluation of technology and/or policy.  All totaled, the Ponemon Institute’s 2014 Cost of a Data Breach Study pegs the cost of a lost record in the US at $195 per record – up from $188 in 2013.

Whirlwind week at Infosec 2014 in London

Friday, May 2nd, 2014

Just like that – you snap your fingers, and it’s over! What a great week we had at Infosecurity Europe 2014 in London with non-stop traffic at our booth, great meetings, and loads of interest in our classification solutions for both desktop and mobile. Even the London tube strike couldn’t dampen spirits and keep people from the expo! (more…)

Why Does Your Organization Classify Information?

Wednesday, April 9th, 2014

In a recent article on DARKReading, John Sawyer looks at how organizations can make classification work. One of the key points he makes is that organizations that involve their employees from the beginning and who focus on user training and awareness are the ones that are most successful in implementing a classification program: (more…)

Getting end-users on board with classification…Dell did it, so can you!

Tuesday, March 25th, 2014

When we’re at various trade shows and events, IT Managers, CIOs and CISOs will often come to us with a similar concern. They can see how involving end users in protecting sensitive information may be a great idea, but they don’t know how they can get several hundred or several thousand employees on board with the idea of classifying information at the desktop. Can it be done? (more…)