Author Archives: Jen Bonney

Cyberattacks By Numbers: A Cautionary Tale

With the ubiquity and danger of cyberattacks in today’s connected landscape, scare tactics may be the only way to ensure organizations and individuals are implementing the right cybersecurity measures. Check out the infographic below if you need further incentive to pursue an email security and document protection solution.   Infographic created by Venngage.
Read More

Inside the Mind of a Hacker

A Juniper Research report estimates that cybercrime will cost businesses over $2 trillion by 2019. To protect against the massive impact of cybercrime, it’s important to get inside hackers’ heads to better understand their motivations. While hackers are often portrayed as criminals, there are many ethical hackers, also called white hat hackers, that seek to find problems so they can be fixed. Companies pay for these services as it makes their products more secure. Indeed, the Spectre and Meltdown vulnerabilities...
Read More

RSVP to GDPR – Your compliance is required

Even though it may seem less like an invitation and more like a jury summons, the General Data Protection Regulation (GDPR) is not all doom and gloom. Instead of thinking of GDPR as an intimidating event where your presence is mandatory, see it has an opportunity to build trust with your customers while abiding by the law. Complying to GDPR requirements ensures that the level of security and protection your organization has in place is ready for the digital era....
Read More

It’s the year of the hack! Do you know how many?

The numbers tell the story. And we’re still counting. Oxford Dictionaries chose youthquake as the word of the year for 2017. Even though it originally came into vogue in 1965 by Diana Vreeland when she was editor of Vogue, once again it’s trending, with five times more usage than in 2016. Given the amount of hacks and breaches in 2017, a more apt word of the year should be hackquake or breachquake—seriously. Yes, totally new words coined to reflect today’s ubiquity...
Read More

The People Factor—menace or protector?

People. Process. Technology. It’s been the mantra of businesses for decades. The challenge is to have a balance of all three—technology is only as good as the processes, which are only as good as the people. Today it starts with the right people committed to corporate governance processes that facilitate collaboration and ensure content protection for emails and documents at rest…in transit…and in use through a technology-enabled cloud solution. People. Process. Technology. People. Game changer. Now we have a 50% increase...
Read More

It’s in the employee handbook. That’s the corporate way of saying, “Because I said so!”

Protection of intellectual property (IP) and compliance with regulatory and corporate governance policies is changing the way we communicate and collaborate in our everyday work life. Rules must be put in place to safeguard our proprietary data. Establishing corporate governance policies that dictate—yes, in this case, dictate is correct—is what all savvy organizations are doing to ensure that content is not only protected at rest…in transit…and in use, but also in compliance with all regulations. We all hate being...
Read More

Differentiation through compliance — It’s the new black!

  It’s hot. It’s the latest trend. It’s on point. It’s the positive correlation between implementing a cybersecurity compliance solution and a reduction in the number of cyberattacks. That means: Put content protection in your organization to meet compliance regulations, and you have a better chance of preventing data leakage of your confidential and proprietary intellectual property, emails and documents. It’s a strategy that sets you apart from the competition—and establishes you as conscientious and forward thinking. Meeting compliance regulations, reducing cyber...
Read More

Long live the king—content, that is! With cyber security culture protection

In September, the country was hit once again with a colossal data breach. This time, one of the country’s “kings” of Personally Identifiable Information (PII) was hit by a data breach impacting 143 million people. If it could happen at Equifax, it can happen anywhere. Will this be the straw that breaks the camel’s hack—I mean, back? On October 2, we began observing the 14th annual National Cyber Security Awareness Month (NCSAM). A little late for Equifax. We can only...
Read More

GigaTrust Announces Secure Document and Email Collaboration for the DoD Supply Chain

Provides Secure Document Sharing on PCs, mobile devices and with file storage systems Herndon, Virginia – October 11 2017 – GigaTrust™, a leading provider of endpoint security that delivers in-use protection of documents and emails, today announced the availability of the first and only  “community of interest” deployment of GigaCloud, the Company’s fully-managed document and email security ecosystem that is dedicated for Department of Defense (DoD) suppliers required to meet strict security compliance standards when sharing documents and emails amongst...
Read More

Prescription for the ailing healthcare industry

It’s not: “take two aspirin and call me in the morning” It is: STOP being a prime target for data breaches Are you aware of these alarming statistics? Over 100 million healthcare records from more than 8,000 devices in more than 100 countries were compromised in 2015.[1] Data breaches cost the healthcare sector $6.2 billion—with nearly 8 out of 10 healthcare institutions hit by 2 or more data breaches in the last 2 years and 45% affected with more than 5 breaches.[2] Nearly...
Read More