Author Archives: Jen Bonney

It’s in the employee handbook. That’s the corporate way of saying, “Because I said so!”

Protection of intellectual property (IP) and compliance with regulatory and corporate governance policies is changing the way we communicate and collaborate in our everyday work life. Rules must be put in place to safeguard our proprietary data. Establishing corporate governance policies that dictate—yes, in this case, dictate is correct—is what all savvy organizations are doing to ensure that content is not only protected at rest…in transit…and in use, but also in compliance with all regulations. We all hate being...
Read More

Differentiation through compliance — It’s the new black!

  It’s hot. It’s the latest trend. It’s on point. It’s the positive correlation between implementing a cybersecurity compliance solution and a reduction in the number of cyberattacks. That means: Put content protection in your organization to meet compliance regulations, and you have a better chance of preventing data leakage of your confidential and proprietary intellectual property, emails and documents. It’s a strategy that sets you apart from the competition—and establishes you as conscientious and forward thinking. Meeting compliance regulations, reducing cyber...
Read More

Long live the king—content, that is! With cyber security culture protection

In September, the country was hit once again with a colossal data breach. This time, one of the country’s “kings” of Personally Identifiable Information (PII) was hit by a data breach impacting 143 million people. If it could happen at Equifax, it can happen anywhere. Will this be the straw that breaks the camel’s hack—I mean, back? On October 2, we began observing the 14th annual National Cyber Security Awareness Month (NCSAM). A little late for Equifax. We can only...
Read More

GigaTrust Announces Secure Document and Email Collaboration for the DoD Supply Chain

Provides Secure Document Sharing on PCs, mobile devices and with file storage systems Herndon, Virginia – October 11 2017 – GigaTrust™, a leading provider of endpoint security that delivers in-use protection of documents and emails, today announced the availability of the first and only  “community of interest” deployment of GigaCloud, the Company’s fully-managed document and email security ecosystem that is dedicated for Department of Defense (DoD) suppliers required to meet strict security compliance standards when sharing documents and emails amongst...
Read More

Prescription for the ailing healthcare industry

It’s not: “take two aspirin and call me in the morning” It is: STOP being a prime target for data breaches Are you aware of these alarming statistics? Over 100 million healthcare records from more than 8,000 devices in more than 100 countries were compromised in 2015.[1] Data breaches cost the healthcare sector $6.2 billion—with nearly 8 out of 10 healthcare institutions hit by 2 or more data breaches in the last 2 years and 45% affected with more than 5 breaches.[2] Nearly...
Read More

How to Use Data Analytics to Detect and Deter Company Breaches & Hacks

In this day and age of Big Data, enterprises are leveraging a large amount of information from a variety of sources to make critical business decisions that drive profits and growth. A medium–size network with 20,000 devices (e.g., laptops, smartphones, and servers) is said to transmit more than 50 TB of data in a 24–hour period. After capturing and collating this large amount of data, companies often need to share the information across multiple departments electronically so further insights can be...
Read More

Are you minding the gap? The cybersecurity skills gap, that is.

It used to be that when you heard or saw ‘mind the gap,’ you knew it was the familiar London tube warning to carefully step over the space between the station platform and the train car. A gap is never a good thing. Oh, how things have changed. Today, everyone’s talking about minding the gap—but not in transportation—in cybersecurity. The digital world has changed how we think, what we do, and how we protect ourselves. Everything is data. Everything needs...
Read More

Crozdeck Infographic: “Is your business safe from hackers in 2017?”

Did WannaCry make your company want to cry? Did NotPeyta have you hoping that it was not your organization? With large-scale cyber-attacks, such as hacking, malware and unintended disclosures, becoming more frequent and severe in 2017, there has never been a better time to invest in solutions that protect your customers’ data and reputation while mitigating potential risks. Check out the recent infographic from the IT & Security team at Crozdesk and learn about how solutions like GigaTrust are...
Read More

Keeping Your Emails and Documents Safe

Original article published on VPNMentor. The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and safe to share these documents. Their GigaCloud collaboration platform not only encrypts emails/documents at rest and in transit, but also provides in use protection by manually or automatically applying usage rights In this interview with Robert Bernardi, the founder, chairman, president, and CEO of GigaTrust, we not only discuss the...
Read More

What US Businesses Need To Know About the GDPR Law

Excerpt: EU’s GDPR law will go into effect in May 2018 and will affect many US-based businesses. Here’s what you need to know and what to do to stay compliant.   If your organization processes any kind of personal data, you’ll need to assess how the EU’s GDPR law will affect your business. Even for companies based in the United States, it’s very likely that they have clients or customers who are EU citizens — which means this law will affect many...
Read More