Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2022

The Essential Guide to Securing Your Data During Cyber Security Awareness Month

Cybersecurity awareness is an increasingly hot topic, especially during this year’s Cyber Security Awareness Month. There are many things individuals and organisations can do to improve their awareness around security, helping to protect data confidentiality. In this blog post, we will discuss some essential tips for securing your data coming to the end of this important month.

FORTUNE-Favored Data Protection Services for Financial Institutions

FORTUNE-recognized data privacy and protection solutions allow financial institutions the tools and security to improve data storage, flows, and protected usage within minutes. Discover how Protegrity Vautless Tokenization works wonders for organizations, and check out our finance-catered data protection solutions today.

Kintent's Frank Kyazze Takes On Data Connectors Dallas, Identifies Industry Frustration with Security Audits

Recently, we caught up with Frank Kyazze, Privacy Director here at Kintent, to chat about his experience at the Data Connectors conference in Dallas last month. Frank had the opportunity to serve on the “Protecting Against Cyber Attacks” discussion panel while in attendance. Frank took part in the panel, discussing how now more than ever, it is imperative for organizations to be vigilant against bad actors.

From Access-centric Security to Data-centric Security

In the early days of internet security, an access-centric security model made sense. Access lists on routers were complemented by firewalls and, later, intrusion detection systems. Given the processing capacity available at the time, this was absolutely adequate and appropriate for protecting a website, even with e-commerce. But that was the 1990s, and the internet has become so much more than websites with some shopping capabilities. Now, it’s the backbone of our society.

5 Stages of the Vulnerability Management Process

The threat landscape in IT is ever-evolving, with new risks arising practically daily. Trying to anticipate the next type of threat can feel a little like playing whack-a-mole. Instead, IT teams are focusing on vulnerability management: reducing the opportunities for hackers and other bad actors to find a weakness in cyber defenses. Vulnerability management is an iterative process that allows companies to proactively defend valuable assets, no matter how the threat landscape changes.

Protegrity-Freedom To Innovate-Cross-border Data Privacy

Enterprise Data Protection & Privacy Platform for Cross-Border Compliance Why is protecting your data across borders important? For enterprise leaders, executives, and shareholders responsible for data moving across data flows, building a culture of privacy trust through comprehensive coverage establishes credibility, reliability, and growth.

The Freedom To Do More With Cloud Data

Despite the increase in cloud adoption, many organizations are still hesitant to move their confidential and highly sensitive data to the cloud. It’s not uncommon for companies to have concerns about being able to maintain the privacy, integrity, and security of their data when they migrate to the cloud or leverage cloud services. This is especially true for organizations that operate in highly regulated industries, such as healthcare, financial services, insurance, and the public sector.

Encryption Key Management in Microsoft 365

Encryption is an essential means of protecting sensitive information and is required for certain types of data under many regulations. As more companies move to the Cloud and introduce Microsoft 365 (M365) applications like Teams and SharePoint Online to their communication and collaboration channels, the potential for data getting into the wrong hands grows exponentially making encryption strategies essential.

Increase Internet Security While Browsing Online With Proper Antivirus - Top 3 Picks

There are several antivirus applications available, and each one claims to provide the finest security. Only a select number of the finest antivirus programs tested are powerful, safe, and efficient enough to be ranked among the top antivirus programs in 2022. A network firewall, phishing protection, virtual private network (VPN), password managers, parental controls, and specialized mobile protection devices are among the functions that most antivirus products currently incorporate in addition to a virus scanner.

Exploring the differences between symmetric and asymmetric Encryption

Data encryption goes back to ancient civilisations that used forms of message concealment, in peace as well as in wartime. The Egyptians used Disordered Hieroglyphics, the Greeks Steganography, the Spartans Scytale and the Romans, the Caesar Shift Cypher. While these basic methods laid the foundations for modern cryptography, what has evolved are two fundamental approaches based on complex mathematics: symmetric and asymmetric encryption.

Disk vs file encryption - which is better at Data breach prevention?

Data encryption is a bit like insurance - we all know we need it (a necessary evil you might say), but it’s difficult to decide what we need to protect, and with an increasing amount of options out there, it’s a mission in itself to find the right provider. That’s probably why when we take out insurance we tend to only get coverage when we feel it’s absolutely necessary – for example, for our property, our cars and when we travel.

How to Keep Your Data Secure as a Digital Nomad

Now that remote work has become the norm, employees are taking advantage of this opportunity to travel the globe and work from anywhere in the world—as long as it’s within company policy. With the rise of digital nomads, it is important that you know how to keep yourself safe from cyberattacks when working remotely from city to city. This blog will help you understand what you need to do to secure your data as a digital nomad.

SaaS Data Loss Prevention: What is it and Why is it Important?

With the rise of cloud-based applications, data loss prevention (DLP) has become an increasingly important part of information security. DLP refers to the policies and technologies used to prevent sensitive data from being lost or stolen. In the context of SaaS, this can include both the security measures implemented by the SaaS provider and the steps taken by the customer to protect their data.

What is FIPS 140-2?

Encryption is an important security tool for protecting sensitive data. However, not all solutions used the same cipher techniques. There are a number of encryption algorithms that can be used to secure data with varying levels of security. To set acceptable standards for encryption technologies used by the U.S. Government the National Institute of Standards and Technology (NIST) has published the Federal Information Processing Standards (FIPS) series. These standards define how U.S.

Five Steps Towards Building a Better Data Security Strategy

In the past when organizations had a new security need, they would meet that need by purchasing a new security product. But that approach is how we ended up with an average of 76 security tools per enterprise, according to a 2021 survey from Panaseer. You may have a lot of tools, but that doesn’t mean your information is protected.

Why Auto Dealers Are Prime Targets for Ransomware Attacks

It’s no secret that cyber attacks — especially ransomware attacks — are increasing across industries and organizations. Attack methods are evolving and rapid digitization, along with the rise of cloud computing and a remote workforce, are creating new threat vectors and exposing new vulnerabilities. One industry that has become a major target for attacks is the automotive industry.

Understanding Sensitive Data Discovery: Classification and Tools

In its 2022 Cost of a Data Breach report, IBM notes that for 83% of companies, it’s not if a data breach will happen — but when. The sheer volume of data, as well as the difficulty in monitoring shadow IT and the shift to remote work, means that IT security teams face a persistent and ever-changing risk landscape that makes it extremely difficult to keep information secure. Protecting sensitive data starts with data discovery.

Neglecting malware protection - the shared cybersecurity issue amongst schools and non-profits

Schools and non-profits share the same problem when it comes to cybersecurity budgeting: limited resources which forces a choice between staff with the right expertise and effective tools that work for the organisation.

Why Data Security is So Important

Register Now Nearly every day, news articles showcase big-name companies that became victims of cyberattacks and the hundreds of millions of dollars of loss it will have on their business. These headlines should not be surprising when you look at the data. The number of ransomware detected in Q1 2022 alone was double that of the whole year of 2021.

How to Reduce False Positives in Data Leak Detection - UpGuard

According to a 2021 study by UpGuard, over 51% of analyzed Fortune 500 companies were unknowingly leaking sensitive metadata in public documents - data leaks that could be very useful in a reconnaissance campaign preceding a major data breach. Without timely detection solutions, all corporate (and personal) accounts impacted by data leaks are at a critical risk of compromise, which also places any associated private internal networks at a high risk of unauthorized access and sensitive data theft.

Nightfall launches the first and only DLP solution for Asana

Today, we are delighted to announce that Nightfall has launched the first and only DLP solution for Asana. As part of this launch, Nightfall has joined the Asana Partner program as an official Technology Partner. Nightfall’s solution for Asana builds comprehensive data protection into the Asana app.

Covered Entities vs Non-Covered Entities Under HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) was enacted in 1996 and sets forth a comprehensive set of standards for protecting sensitive patient health information. The Privacy Rule applies to all entities that fall within the definition of a “covered entity“, which generally includes healthcare providers, health plans, and clearinghouses.

Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

archTIS Director of Federal and Defense, Bill Kalogeros recently presented a CMMC 2.0 Workshop with FCW on new controlled unclassified information or ‘CUI’ marking requirements for CMMC 2.0 which is expected to go into effect in May of 2023. Here’s a summary of his session and a link to the recording to learn more about the pending changes to CUI handling and how to prepare.

NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

Customers, Partners and Colleagues, I am excited to share that archTIS’ NC Protect product has been named 2022 Policy Management Solution of the Year in the 6th annual Cybersecurity Breakthrough Awards.

What is the FTC Safeguards Rule?

The FTC Safeguards Rule, is a set of regulations promulgated by the Federal Trade Commission in order to protect the privacy of consumers’ personal information. The Rule requires financial institutions to develop, implement, and maintain a comprehensive information security program designed to safeguard customer information.

Why Data Loss Prevention strategy is core to successful M&A

When two companies merge, there is typically a lot of data that needs to be transferred between the two organizations. This data may include confidential information such as customer records, financial reports, and employee data. If this data falls into the wrong hands, it could be used to commit fraud or theft. That’s where data loss prevention (DLP) comes in.

How To Store Employee Personal Data Securely and Why It Matters

As an employer, you have both a moral and legal obligation to shore up sensitive information about your employees. Sensitive information includes genetic and biometric data, medical records, SNNs (social security numbers), and criminal history records, just to name a few. Fail to do so, and you will open yourself up to loads of risk. Hackers are constantly on the hunt for applicant and employee data that they can further sell on the dark web or use to perpetrate fraud.

5 Ways to Prevent Secrets Sprawl

The number of secrets exposed in public repositories is staggering. With reports in 2021 reaching up to 6 million secrets detected, an increase of 50% from 2020. Secret sprawl is part of every organization, but it is a plague on the open-source world of software development. Even if your organization has a top-notch security-aware culture, human error will inevitably cause secrets to leak and data to be lost or compromised.

Establish an Efficient DLP Policy With These 5 Best Practices

Strong data loss prevention requires two things: a strong policy that guides user actions and permissions, and the tools to monitor and manage data security. Many organizations know they need to invest in software, platforms, and other security settings to create secure networks, endpoints, and cloud settings. But not every organization has a strong DLP policy to guide these tools. Many compliance regimes require companies to record data loss prevention policies.