Endpoint Protector Appliance: Stop data theft on Windows and Mac

Protecting a company’s confidential data can make people happier

November 25th, 2009 by Agent Smith (0) DLP,endpoint security

Two women relaxing on grassI’m quite convinced people who work for companies that protect their private data and do not allow it to be easily lost or stolen are happier. And I’ll explain why!

I work in such a company. This company uses software that ensures protection against confidential data theft, so no company data leaves the network. No data leaks means no financial loss on this side. No loss means stable revenue, investments in the growth of the company, which translates into a job that is secure, bigger salaries, more employees.

And even if money doesn’t buy us happiness, it is obvious that an employee who doesn’t worry much about tomorrow is more relaxed, more productive, in a better mood and finally happier.
So, a CEO and a CIO who want to add more value to their business, who want to reduce loss and increase revenue, who want more productive and happier employees will invest in a solution to protect their company against data theft and leakage.

What do you think? Can protecting a company’s confidential data make us happier?

Most employees would steal data. Companies worry, but do nothing

November 25th, 2009 by Agent Smith (0) Data Theft & Loss,Research and Studies

If any manager out there was still wondering if their employees would actually steal company data, the answer is here. Yes, they would, although they know it’s illegal. And while most companies know the main threats that can lead to data theft are insiders, they do little to nothing about it. This is the Dark Reading conclusion after putting together two separate surveys conducted by security vendors.

One of the researches surveyed over 600 employees from the financial districts in New York, USA, and London UK. A lot of respondents admitted they had no problem taking work home and then keeping it for their own benefit. While the overwhelming majority knows this would be illegal, some had already taken confidential data to a new job and others said they would share such data at any time with friends or family if that would help them get hired in a better position. There are also those who would just take the private data just in case, as a long term insurance policy. Read more

Blue Cross Blue Shield data breach under the microscope

November 23rd, 2009 by Agent Smith (0) Data Theft & Loss,In The Spotlight,Laws & Standards

A data breach that results in exposing private details usually means bad consequences. Especially when an institution fails to properly inform those affected of what had happened. Such is the case of the recent Blue Cross Blue Shield’s (BCBS) loss of confidential information, including tax identification and social security numbers, for about 800000 healthcare providers from all US.

The data breach in question is currently being investigated by Connecticut Attorney General Richard Blumenthal as BCBS may have broken the state law by suffering the breach and then failing to inform those affected on time.

The information in question was lost back in August when a laptop containing it was stolen. Although the theft has affected providers all across the US, the Connecticut AG is only investigating on behalf of 18,817 of its Connecticut health care providers. What he aims is to obtain credit monitoring for more than just one year, as commonly offered, and seek additional identity theft protection.

Endpoint Protector

On the other hand, BCBS states they started notifying those involved within days from the incident, not a month later as implied by the AG. Either way, they are more than willing to offer credit monitoring for two years, or at least a branch of the institution is!

One third of federal IT security pros face cyberthreats on a daily basis

November 16th, 2009 by Agent Smith (0) In the News,Research and Studies

If you’re wondering how many cybersecurity threats a federal agency faces on a daily basis, a new survey has the answer to your question. At least one, each day, every day. About a third of the IT professionals employed by federal agencies say they experience at least one cybersecurity incident each day, be it external attack, malware, lost device, inappropriate employee access, or other threat.

When one thinks that of these 31% at least a few work for the same agencies. Threfore the numbers are troubling. The frequency of such problems are at the same level or slightly higher than last year for most survey respondents, and their severity has remained about the same. The top issues of this year are malware (33% of respondents), inappropriate employee activity or network use (25%), managing access for approved remote users (25%), and data encryption (23%).

As most of the participants find a solution to this problem in acquiring new, better performing cybersecurity solutions, and as many agencies already make efforts to buy such technologies, it comes to no surprise that market research firm Input, quoted by DarkReading,  says federal cybersecurity spending will increase 48% from USD 7.9 billion this year to USD 11.7 billion in 2014. And the shining stars of this future wave of inestments are a USD 1.5 billion cybersecurity data center currently being developed by the National Security Agency and a cybersecurity operations center recently opened by the Department of Homeland Security.

Corporate data breaches raise the risk of consumer ID theft

November 13th, 2009 by Agent Smith (0) Data Theft & Loss,Identity Theft,Research and Studies

Paying by Credit Card at Shoe StoreIf a company, bank of hospital handling your private details has suffered a data breach, you are four times more likely to have your identity stolen. So if you have received a notification letting you know your data has been exposed, you should acknowledge the greater risk for ID theft or fraud, says a recent study by Javelin Research and quoted by DarkReading.

This new report comes to completely contradict breached companies breached who commonly state they have no indication that the compromised data has been used by criminals.

“During each of the past three years, an average of 11 percent of consumers received a breach notification,” Javelin said. “Slightly more than 33 percent of breach victims experienced exposure of their Social Security numbers, and 15 percent of breach victims had their ATM PINs compromised. [But] despite 19.5 percent of breach victims suffering some kind of fraud in the past year, only 2 percent attribute their fraud to the breach.”

Endpoint Security and Device Control Solutions with low TCO and great ROI.