Insider threats are a serious issue for any organization. In a survey conducted by Osterman Research in February 2015, we found that during the previous 12 months 26% of organizations have had sensitive or confidential information accidentally or maliciously leaked through email, 8% had experienced data leakage through a cloud-based tool, and 5% had experienced it through social media. Adding to the problem of data exfiltration are issues like phishing and malware installed from simple activities like Web surfing or accessing email: the same survey found that 67% of organizations were victims of malware infiltration from a successful email-based phishing attack, while 63% were victims of malware infiltration through employee Web surfing. (more…)
Archive for the ‘Uncategorized’ Category
Whew – what a week for TITUS at RSA 2015! Great crowds at the booth, great people, a great team – what more could you ask for!?
RSA 2015 started off with a bang last evening for TITUS. Great crowds at the TITUS booth (1215), and lots of people interested in learning more about our information classifications solutions. Today will be an even bigger day for TITUS at RSA as we officially launch TITUS Classification Suite 4, a significant new release of our flagship data identification and information protection suite. (more…)
Mobile devices make it easy to access information from almost anywhere and to share it with just about everyone on earth. However, by their nature as small and highly portable, mobile devices are also more easily lost or stolen—and with them—the data they contain. For businesses, governments, militaries and other organizations that create and deal with sensitive information, mobile devices pose a huge security risk. While there are many solutions designed to protect data on mobile devices, what if you could delete sensitive data from the device before it is put at risk?
For financial services organizations, protecting their customers’ sensitive information is a top priority. When sensitive financial information is breached, fines, lawsuits, and embarrassing headlines are just a few of the many consequences that can occur. (more…)
We were pleased to learn last week that TITUS has been named to the Cybersecurity Ventures first annual list of top 500 Hot Cybersecurity Companies it Watch in 2015. TITUS was ranked 167 on the list, placing it firmly in the top half of list of cybersecurity companies to watch in the coming year.
According to the press release from Cybersecurity Ventures, they “selected thousands of potential companies for inclusion in the Cybersecurity 500 by soliciting feedback from CISOs and end-user security practitioners, researching hundreds of cybersecurity events, and researching dozens of cybersecurity news sources”.
Their selection criteria included a number of factors including security problems solved by the company/software; customer base; feedback from CISOs and decision makers; feedback from IT security evaluators and recommenders; company growth; media coverage; and more.
Remarked TITUS Co-Founder and CEO Tim Upton, “We are pleased to be among such an impressive group of international security companies as the ones included on this list. For over a decade, TITUS has been developing information security solutions that are being used in some of the largest and most reputable enterprises around the world. Our customers know the importance of accurately identifying and classifying their information in order to effectively protect it, and we are seeing significant growth as more and more organizations realize the importance of information identification and classification as a way to increase the effectiveness of their existing security infrastructure.”
Last week, 451 Research analyst Daniel Kennedy released a report which revealed that corporate data protection is the top mobile concern for security managers. How much of a concern? Forty-two percent (42%) of the security managers they spoke to cited data security as the top priority. The next highest concern was user-owned devices (BYOD) at 11%. While I am not surprise that data security is the top concern and BYOD is second, I must confess that I find the huge delta between the two concerns surprising. With BYOD such a distant second, it is apparent that security managers do not feel that company data, such as PII, PHI, PCI and intellectual property (IP), is safe even on corporate-owned devices.
So why is this? (more…)
Recently, CIO Online ran an article by Thor Olavsrud entitled, ‘5 Information Security Trends That Will Dominate 2015’. The trends ranged from the growing prevalence of cybercriminals, to the increasing regulation around the collection, storage and use of information, to the continuation of BYOD trends in the workplace and the need for organizations to develop strong policies around this. (more…)
Having just returned from an RMS User Group meeting in Dusseldorf, Germany, where multiple Microsoft partners and customers were in attendance, writing about classification capabilities combined with RMS is a no-brainer.
Without question, one of the most important trends in IT during the past few years has been the shift to mobile computing – the use of smartphones and tablets to access business email, to read and edit corporate documents, to access corporate applications, and to communicate and collaborate with others in real time. In fact, Osterman Research has found that 33% of the typical information worker’s time is spent doing work on a mobile device, and 42% of work-related content is accessed via mobile devices, while 31% of content is created on mobile devices. (more…)