Without question, one of the most important trends in IT during the past few years has been the shift to mobile computing – the use of smartphones and tablets to access business email, to read and edit corporate documents, to access corporate applications, and to communicate and collaborate with others in real time. In fact, Osterman Research has found that 33% of the typical information worker’s time is spent doing work on a mobile device, and 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices. (more…)
Archive for the ‘Uncategorized’ Category
You know that a great many of your employees are working from their mobile devices – viewing and responding to email, reading attachments and forwarding them on. As Forrester analyst Chris Sherman noted in a report earlier this year, “On average, 15% of employees are accessing sensitive data such as customer information, non-public financial data, intellectual property, and corporate strategy from devices other than work laptops and desktops. Employees are continuing to use their personal devices to view confidential business information.” (more…)
Can you defend your decision to delete data your organization no longer requires? That’s a critical question that every organization must address at some point.
MOST CONTENT SHOULD BE DELETED
A 2012 survey conducted by the Compliance, Governance and Oversight Counsel found that data can be placed into one of four “buckets”:
• At any given time, 1% of data must be retained for litigation holds
• 5% of data must be retained because of regulatory obligations
• 25% of data has some level of business value
• The remaining 69% of data has little or no business value
Consequently, more than two-thirds of data can be safely deleted with little or no consequence. (more…)
It’s happened to you. I know it’s happened to me. I small error in typing an email address, attaching the wrong document to an email, not doing a second check…and click – you’ve just sent something to the wrong person. Oops. For me, it’s never been catastrophic – I might have inadvertently invited one of my friends to a 3pm meeting, causing a bit of confusion – but I’m one of the lucky ones. (more…)
On Tuesday, June 3, TITUS will participate in the Data Risk Management in Financial Services (DRMFS) Summit, taking place at the London Stock Exchange. DRMFS is an international event that brings together heads of security from central banks across the EU, chief information officers (CIO), chief security officers (CSO) as well as regulators, and banking and insurance security specialists to debate internal and external threats to data security. (more…)
Classifying information has always been a common practice for military and government organizations around the world. Back in 2005, when TITUS first began developing email classification software, our first customer was the Australian Federal Government. (more…)
This week, TITUS released an infographic that contains some sobering figures about the true cost of a data security breach. While lost data can mean lost intellectual property (which is hard to place an accurate value on), it most certainly would include fines, expensive customer communications, lawsuits, and an evaluation of technology and/or policy. All totaled, the Ponemon Institute’s 2014 Cost of a Data Breach Study pegs the cost of a lost record in the US at $195 per record – up from $188 in 2013.
Just like that – you snap your fingers, and it’s over! What a great week we had at Infosecurity Europe 2014 in London with non-stop traffic at our booth, great meetings, and loads of interest in our classification solutions for both desktop and mobile. Even the London tube strike couldn’t dampen spirits and keep people from the expo! (more…)
Its great having access to corporate email while my mobile device is offline. If I’m on a plane, or if network access doesn’t work in a particular area, I can still read and reply to my email. But offline access, which is provided via a local database of downloaded email on my phone, can have its risks. If my phone is lost or stolen, all of my email history (whatever period downloaded , Apple Mail defaults to one month) is exposed via this local email.
To reduce this risk, many MDMs offer the ability to wipe lost or stolen mobile phones. But due to slow reporting, the phone may not be wiped for 24-48 hours after the phone is lost. This is the risky period during which the thief can scan the phone for sensitive information. (more…)