Daily we read, see and hear more and more about the privacy, security and economic challenges stemming from the growing number of enterprise cybersecurity events. This week our cartoon and clip features one approach to minimizing the impact of these events (cartoon) and five quick reference links to recent and relevant mentions of cybersecurity (clip).
Documents in file shares, content management systems, and scanned archives are often described as “unstructured.” However, there is typically a high level of structure in and interconnectedness among those documents. This structure and interconnectedness occurs because specific document types contain recurring attributes or data elements and those attributes or data elements are shared with other document types.
“The value of personal financial and health records is two or three times [the value of financial information alone], because there’s so many more opportunities for fraud,” said David Dimond, chief technology officer of EMC Healthcare, a Massachusetts-based technology provider. Combine a Social Security number, birth date and some health history, and a thief can open credit accounts plus bill insurers or the government for fictitious medical care.
Regularly we read, see and hear incredibly serious presentations and pontifications related to the theory, practice and business of electronic discovery. This week our cartoon and clip features a quick look at Rule 26(f) conference planning for a frivolous lawsuit (cartoon) and a quick reference link to a very serious retrospective listing of 26 eDiscovery-related cartoons (clip).
The NetDiligence 2014 Cyber Claims Study relies on data voluntarily provided by insurers about amounts paid out on cyber claims occurring from 2011 through 2013. Since the Study only accounts cyber claims reported to larger insurers, NetDiligence believes its study only accounts for 5-10% of the total number of all cyber claims handled in those years.
There is a growing number of government and industry regulations and standards designed to help protect the confidentiality of data that companies have in their care. The need for guidance in this area is obvious, as 2014 saw a record number of software vulnerabilities and actual data breaches. Unfortunately, many of the companies that experienced those breaches are now facing lawsuits filed by individuals, investors and other entities that claim they were harmed by the exposure of their information.
Regularly we read, see and hear more and more about mergers, acquisitions, investments and investors in the business of electronic discovery. This week our cartoon and clip features an abstract look at investing in eDiscovery (cartoon) and two quick reference links that highlight merger, acquisition and investment activities from both an activity level and an investor level (clip).
One of the most challenging aspects to identifying and protecting PII is how to deal with “unstructured” content, i.e., with documents or files on file shares, personal computing devices, and content management systems. These files can be generated within and outside the organization using many applications, can be converted to multiple file formats (most commonly to PDF), and seemingly have unlimited form and content.
83% of organizations are prioritizing structured data initiatives as critical or high priority in 2015, and 36% planning to increase their budgets for data-driven initiatives in 2015.
Secretary Clinton will likely do unintentionally for the duty to preserve electronic records in controversy what Edward Snowden did intentionally for the very right to privacy from government surveillance that Secretary Clinton now claims: She may put it on the map—into the global, public tag cloud—in a big way.
Daily we read, see and hear more and more about the challenge and cost of managing email. This week our cartoon and clip features a metric highlighting one cost of email (cartoon) and four quick reference links to recent mentions of the potential impact of organizational email practices (clip).
Daily we read, see and hear more and more about the challenge of information security for private and public sector organizations. This week’s cartoon and clip features one of the reasons information security is so important to organizational leaders (cartoon) and a quick reference link to one of the most current and comprehensive resources for actionable security-related intelligence for businesses and governments (clip).
The attack on Sony Pictures Entertainment exposed sensitive intellectual property, revealed personal employee details, and demonstrated the vulnerabilities of U.S. companies to cyberattack. Two months later, the dust continues to settle as the repercussions of this breach are assessed. Far beyond the millions of dollars in lost revenue, Sony may suffer significant reputational risk and could endure protracted lawsuits for years to come. For the financial industry, the implications of a breach of this magnitude would extend even further, into its fiduciary responsibility to protect the vital economic lifeblood of the United States.
A two-year-old technology is at the spearhead of a genuine revolution in data center architectures, for both software and hardware.
Recent amendments to the ABA Model Rules of Professional Conduct (Model Rules) indicate less leeway for lawyers who inadvertently violate their ethical obligations through the use of technology, including such ubiquitous services as cloud computing.
New study shows not only is medical identity fraud costly for individuals, it’s happening a lot more often. Having steadily grown over the past five years, medical identity theft increased by a whopping 21.7 percent in 2014, according to a new report conducted by the Ponemon Institute on behalf of the Medical Identity Fraud Alliance (MIFA).
With the global market for electronic health records expected to exceed $22 billion by the end of this year, healthcare providers are shifting their focus on big data analytics and cloud computing to improve patient health information management.
Before data was big, Google was a verb, or Gordon Moore wrote his law, insurers were using math and statistics to predict the future. As early as the 2 nd millennia BC, Babylonian sea merchants paid lenders extra for a promise of help if their ship was to sink. They set prices by correlating data points to calculate the likelihood and potential cost of a disaster at sea. Data was sparse, and one would assume neither merchant nor lender consistently got a good deal. In 2015, property, casualty, life and health insurance companies are awash in data.
Pew research report “ The Future of Privacy ” indicated by 2015 that 55% of the 2,211 respondents no one should really expect any privacy and that the IoT (Internet of Things) will make things worse.
In November 2014—just two weeks after Admiral Michael Rogers, director of the National Security Agency, testified to the House Intelligence Committee that certain nation-state actors had the capability of “infiltrating the networks of industrial-control systems, the electronic brains behind infrastructure like the electrical grid, nuclear power plants, air traffic control and subway systems”—Sony Pictures announced it had experienced a major cyber-attack, one many sources believe was likely perpetrated by or on behalf of a nation-state. This destructive cyber-attack was a game-changer for corporate America because it became clear that hackers are not simply focused on credit card numbers or personal information. Indeed, the attack on Sony was designed to steal the Company’s intellectual property, disseminate personal emails of high-ranking executives, and destroy Sony servers and hard drives, rendering them useless.
The Anthem security breach and massive PII data exposure is an unfortunate recent reminder that breaches are now routine. Hackers can leverage the most basic vulnerabilities, such as static passwords to gain access to protected systems. It also highlights a troubling new trend whereby hackers use cloud services, particularly unapproved cloud storage and file sync and share services as the data exfiltration vector. The most troubling part is that hackers don’t require innovative schemes to exfiltrate data, but rather use unmonitored and unsecured cloud services as a front door exfiltration vector.
Two of the principal reasons that paper documents are not backed up digitally is the high cost of scanning or digitizing them in the first place, and the challenge of then being able to index and access them after they’re digitized. BeyondRepro, a member of the BeyondRecognition network of companies, has new technology that addresses both issues, as well as a business model that makes it even more practical to backup paper documents.
Leveraging advanced visual classification technology to evaluate sensitive data and redact based on either word or pattern matching or on redacting certain zones within groupings of visually-similar documents, BeyondRedaction allow corporations to quickly and cost effectively redact sensitive data at a rate far exceeding traditional standard redaction technologies and processes.
There is a battle in the legal tech world between Information Governance and Search. It reflects a larger conflict in IT and all of society. Last year I came to believe that Information Governance’s preoccupation with classification, retention, and destruction of information was a futile pursuit. I challenged these activities as inefficient and doomed to failure in the age of information explosion. Instead of classify and kill, I embraced the googlesque approach of save and search. I became wary of the whole approach of governing information as hostile to individual privacy rights and liberties.