Posts Tagged ‘security’

The Saga Continues… From Data Creation to Data Consumption to Data Exposure

The Saga Continues… From Data Creation to Data Consumption to Data Exposure

Despite the many potential benefits of big data analytics, the unrestrained creation and retention of data has the potential to bury organizations under a mountain of legal, regulatory and operational challenges.


With a Simple Mask, Your Data Becomes the Governance Superhero

With a Simple Mask, Your Data Becomes the Governance Superhero

A major divide exists within many organizations between the governance, automation and scalability needed by IT and the ease of use and flexibility business users demand – and it can no longer be ignored. But what’s to be done?


The Paper Trail: The Potential Data-Breach Sitting in your Printer

The Paper Trail: The Potential Data-Breach Sitting in your Printer

The continuing role of paper records in office life is a stark reminder that data security is not limited only to electronic records.


Securing the Hybrid Cloud: What Skills Do You Need?

Securing the Hybrid Cloud: What Skills Do You Need?

Hybrid models offer many well-documented benefits, but they also introduce more complexity for securing data and applications across the enterprise. And this added complexity requires an increasingly diverse skill set for security teams.


QDiscovery Acquires Forensicon

QDiscovery Acquires Forensicon

QDiscovery, a leading provider of end-to-end eDiscovery services, has acquired Forensicon, a Chicago-based digital forensics and investigations company.


Wearables at Work: Data Privacy and Employment Law Implications

Wearables at Work: Data Privacy and Employment Law Implications

Organisations should consider whether using wearable technology to monitor their employees’ performance, health and well-being may also give rise to other legal risks or issues under workplace health and safety laws, in negligence or under a contract.


2016 Internet Trends Reports by Mary Meeker

2016 Internet Trends Reports by Mary Meeker

Kleiner Perkins Caufield & Byers partner Mary Meeker delivers her annual internet trends report. She says “easy growth is behind us” as the newest internet users are coming from less developed and less affluent countries.


Does kCura’s Cloud Software Signal a Shift in Strategy?

Does kCura’s Cloud Software Signal a Shift in Strategy?

Earlier this month, Chicago-based kCura announced it plans to release a new version of its flagship e-Discovery software, called RelativityOne.


3 Common Cloud ROI Failures You Must Avoid

3 Common Cloud ROI Failures You Must Avoid

You can actually spend more money running your workloads in the public cloud than in your own data center.


The Importance of a Proactive Information Governance Program

The Importance of a Proactive Information Governance Program

In the age of “big data”, with many organizations feeling the constant threat of security breaches and struggling to stay on top of the numerous privacy concerns, it is very important for organizations to have in place systems to effectively manage their information. Studies suggest that management of information is impacting business productivity and creating costs and liabilities for organizations.


Recent HIPAA Settlements Highlight the Importance of Business Associate Agreements

Recent HIPAA Settlements Highlight the Importance of Business Associate Agreements

The Office of Civil Rights (OCR), the agency within the United States Department of Health and Human Services that enforces the HIPAA Privacy and Security Rules, recently sent a clear message about the importance of business associate agreements.


Is CaaS the Solution for Privacy and Security in the SaaS World?

Is CaaS the Solution for Privacy and Security in the SaaS World?

A new application of the technology software “containers” offers a potential approach that may reduce many of the risks in current SaaS offerings, while allowing for more security and control.


Big Law Firms See Strongest Revenue Gains Since ’08, Survey Finds

Big Law Firms See Strongest Revenue Gains Since ’08, Survey Finds

The supply of legal service providers has increased, creating a hypercompetitive market and forcing law firms to think about how they deliver legal services.


FTC: Data Security Primer for Small Businesses and Start-ups

FTC: Data Security Primer for Small Businesses and Start-ups

In Start with Security, the FTC reiterates its long-standing view that data security should be a top priority for any organization, even those in start-up mode.


Privacy Shield Update: A Recap of Recent Developments

Privacy Shield Update: A Recap of Recent Developments

Although the Privacy Shield remains in limbo at this time, a flurry of speculation and Shield-adjacent legal maneuvers have colored the landscape and heightened concerns about its long-term viability.


The Encryption Challenge

The Encryption Challenge

According to a recent 451 Research survey of senior security executives, government agencies seem to be fighting the previous war. Instead of protecting data from hackers who’ve already gotten in, they’re still focusing on keeping the bad guys out of their systems.


When “Protect and Defend” Becomes “Preserve and Collect”

When "Protect and Defend" Becomes "Preserve and Collect"

What it boils down to is simply this: the price is only one piece of the puzzle. Depending on your company’s size, needs, and storage requirements, as well as risk tolerance, resources, and expertise, different solutions may seem optimal.


The Scariest Hack So Far

The Scariest Hack So Far

Ransomware, extortion and data sabotage may lead to ongoing issues for data controllers. Each of these types of cyberattacks is evolving in ways that are truly devious.


In God We Trust. All Others Use Blockchain

In God We Trust. All Others Use Blockchain

The blockchain provides a way to track and verify transactions without requiring a central tracking authority. Right now it is used mainly by Bitcoin (or similar crypto-currencies), but it could find applications in other domains.


Cybersecurity: Big Problem for Small Firms?

Cybersecurity: Big Problem for Small Firms?

Cybersecurity should be a major priority for all firms in 2016. The problem is, not everyone is playing with big law resources.


Ignoring Orphaned Data is a Risky Business

Ignoring Orphaned Data is a Risky Business

One of the most pressing problems facing information management professionals at organizations is orphaned data — data that has no owner.


How to Design a Document Retention Policy

How to Design a Document Retention Policy

Data minimization can be a powerful – and seemingly simple – data security measure. The term refers to retaining the least amount of personal information necessary in order for an organization to function. Less information means that there is less that the organization needs to protect, and less opportunity for information to be lost or stolen.


Nearly Two-Thirds of Confirmed Data Breaches Were Related to Password Issues

Nearly Two-Thirds of Confirmed Data Breaches Were Related to Password Issues

Verizon’s 2016 Data Breach Investigations Report doesn’t waste any time providing useful statistics regarding the state of data breaches – they state right on the cover of the report that “89% of breaches had a financial or espionage motive.”


Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

Survey of IT Pros Highlights Lack of Understanding of SaaS Data Loss Risks

It turns out that IT pros across the pond have the same concerns as here in the U.S., as the survey found that security is the top concern when moving critical applications to cloud. Specifically, 44 percent of U.S. and U.K. IT pros cited external hacking/data breaches as their top concerns, ahead of insider attacks and user error.