Category Archives: Homepage

It’s the year of the hack! Do you know how many?

The numbers tell the story. And we’re still counting. Oxford Dictionaries chose youthquake as the word of the year for 2017. Even though it originally came into vogue in 1965 by Diana Vreeland when she was editor of Vogue, once again it’s trending, with five times more usage than in 2016. Given the amount of hacks and breaches in 2017, a more apt word of the year should be hackquake or breachquake—seriously. Yes, totally new words coined to reflect today’s ubiquity...
Read More

The People Factor—menace or protector?

People. Process. Technology. It’s been the mantra of businesses for decades. The challenge is to have a balance of all three—technology is only as good as the processes, which are only as good as the people. Today it starts with the right people committed to corporate governance processes that facilitate collaboration and ensure content protection for emails and documents at rest…in transit…and in use through a technology-enabled cloud solution. People. Process. Technology. People. Game changer. Now we have a 50% increase...
Read More

It’s in the employee handbook. That’s the corporate way of saying, “Because I said so!”

Protection of intellectual property (IP) and compliance with regulatory and corporate governance policies is changing the way we communicate and collaborate in our everyday work life. Rules must be put in place to safeguard our proprietary data. Establishing corporate governance policies that dictate—yes, in this case, dictate is correct—is what all savvy organizations are doing to ensure that content is not only protected at rest…in transit…and in use, but also in compliance with all regulations. We all hate being...
Read More

Lessons Learned from CIA WikiLeaks Fiasco: Breach Prevention Starts with Content Protection

Oh, No—Not again! No one should be surprised. And yet, we are. We know that hackers have the tools to breach. The real surprise is that organizations are being lax and not moving fast enough to take the right preventative steps by implementing in-use content protection. We can’t stop the bad guys from trying—but we can stop them from getting their hands on our stuff, and sharing it without permission. Government organization or company—this must stop. We need content protection. Latest...
Read More