Honoring Those Who Serve and Sacrifice

November 10th, 2017

I’m moving too fast. We probably all are.

As the weather begins to cool, I realize that the day we honor soldiers who have served faithfully and dutifully is nearly here. And then I wonder if I’ve taken enough time to reflect. To show my appreciation. Have I – at the very least – donated enough money to veterans associations to help ensure that our veterans and their families are properly supported when they need it?

The answer is usually, embarrassingly, no.


Read the rest of this entry »

 

Extending SharePoint RMS (IRM) Support to Mobile

January 2nd, 2015

Microsoft RMS support, also know as Information Rights Management (IRM), has been supported in SharePoint since the SharePoint V3 release. This functionality allows you to limit the actions that users can take on documents or files that have been downloaded from SharePoint lists or libraries. RMS encrypts the downloaded files and limits the set of users that are allowed to decrypt these files. RMS can also limit the rights of the users who are allowed to read files so that they cannot do additional things such as print copies of the files or copy text from them. When people download files in an IRM-enabled list or library, the files are encrypted so that only authorized people can view them. This functionality works great if you are opening a SharePoint file on your desktop, but what happens if you want to access these SharePoint files on your mobile device? TITUS has introduced an iOS app that allow you to extend SharePoint IRM to iPhone and iPad devices.

A growing number of Mobile Device Management (MDM) vendors now offer secure document containers and direct access to SharePoint to allow users to view SharePoint documents on mobile devices. MobileIron offers their Docs@Work app and AirWatch has their Secure Content Locker. The problem with these apps, as well as the iOS and Android operating systems, is that they are not RMS aware. Read the rest of this entry »

 

Easily Transition from UK GPMS to GSC

April 3rd, 2014

Effective April 2, 2014, the new UK Government Security Classifications (GSC) policy replaces the previous Government Protective Marking Scheme (GPMS). The new policy requires the classification of Her Majesty’s Government (HMG) information assets into one of three types: OFFICIAL, SECRET, and TOP SECRET. This classification scheme, simplified from the previous GPMS seven-level classification scheme, will help ensure that government staff, contractors, and service providers can more easily safeguard information.
Read the rest of this entry »

 

Changes to ITAR compliance coming

September 17th, 2013

In October, there will be two new rules affecting the Export Control Reform made by the Departments of State and Commerce. On October 15, jurisdiction of many military items, which have been deemed less sensitive, will be moved from the U.S. Munitions List and governed by the State Department’s International Traffic in Arms Regulations (ITAR), to be on the Commerce Control List that is governed by the Commerce Department’s Export Administration Regulations (EAR). The 600 Series classification provisions will allow this to happen, as it will mandate sweeping changes to the affected items, such as a “catch-and-release” definition of items that are controlled for defense and trade purposes.

“While there is still more work to be done, taken together, these reforms will focus our resources on the threats that matter most, and help us work more effectively with our allies in the field,” President Obama said at the Department of Commerce Annual Export Controls Update Conference. “They’ll bring transparency and coherence to a field of regulation which has long been lacking both.”
Read the rest of this entry »

 

TITUS Classification Solutions Now Support Microsoft Office 2013

April 5th, 2013

Microsoft Office 2013 has been available to corporate customers for about 4 months, and it was released to the public in February of this year.  Office 2013 is available via its traditional packaging, and is now also available via the Office 365 subscriptions.   The Office 365 subscription allows customers to stream the Office 2013 install to their desktop.  In either case there are a number of major changes to Office in this release. 

Some of the changes in Office 2013 may involve a change in the user’s workflow.  For instance, in Outlook 2013 Microsoft has streamlined the process of shooting off a quick reply in Outlook 2013. Instead of clicking Reply to open up a new email, you can simply start typing and reply inline on the message itself.

Read the rest of this entry »

 

US Export Control and ITAR: Upcoming Changes

April 1st, 2013

March has been a very busy month for US export control reform. On March 8, President Obama signed a new Executive Order that updates delegated presidential authorities over the administration of certain export and import controls. The Administration also announced that it had notified Congress on March 7th about its proposed export control changes for aircraft and gas turbine engines. These changes are very important because they involve transferring certain parts and components from the ITAR-controlled United States Munitions List (USML) to the Commerce Control List (CCL). This transfer will lead to a more streamlined export control process, which will make it easier for companies to export items to US allies, helping to boost sales and increase US competitiveness.
Read the rest of this entry »

 

Mobile email security: Why using a lightweight container is the recommended approach for both security and work/life balance

December 13th, 2012

It’s no secret.  I dress up at work.  It is not required at my workplace, nor is it necessarily the culture.  It’s a personal choice.  I think it provides benefits for my work life, as well as my home life.  How does dressing up at work help in my personal life?  And what does this have to do with mobile email security?  Good questions.

We all know mobile devices are everywhere.  We all see the stats.  We all have one.  Most of us use our mobile devices for both personal and business endeavors.  For employees and managers alike, mobile computing is a welcome trend. They can check their email and conduct other business in any location. If they can combine work and personal information on their device, they only require a single device for all their needs.  This causes a serious security problem, especially for the most used app on any mobile device:  email.  Today’s smartphones make it difficult to draw the line between personal and business email, as both business and personal email (and their attachments) tend to live all in the same place, and without separation.  This is where the problem of protecting business information, all mixed together with personal information becomes very difficult.  With more and more users mixing business and personal data on their mobile devices, the risk of a data leak occurring from email increases significantly because:

  • Mobile devices are often used in public environments, where users are more likely to get distracted. This increases the potential for mistakes and accidental emails.
  • Mobile devices are easily lost, misplaced or stolen. How do we protect sensitive data on the missing device?
  • Privacy/e-Discovery. How do organizations know what data is on the mobile device? How can this data be found for e-Discovery purposes? What right does the company have to data on the device, when business data is mixed with personal data?

What is the answer to mitigating this biggest mobile risk of email?  Dress up at work.

Read the rest of this entry »