Blog

It’s the year of the hack! Do you know how many?

The numbers tell the story. And we’re still counting. Oxford Dictionaries chose youthquake as the word of the year for 2017. Even though it originally came into vogue in 1965 by Diana Vreeland when she was editor of Vogue, once again it’s trending, with five times more usage than in 2016. Given the amount of hacks and breaches in 2017, a more apt word of the year should be hackquake or breachquake—seriously. Yes, totally new words coined to reflect today’s ubiquity...
Read More

The People Factor—menace or protector?

People. Process. Technology. It’s been the mantra of businesses for decades. The challenge is to have a balance of all three—technology is only as good as the processes, which are only as good as the people. Today it starts with the right people committed to corporate governance processes that facilitate collaboration and ensure content protection for emails and documents at rest…in transit…and in use through a technology-enabled cloud solution. People. Process. Technology. People. Game changer. Now we have a 50% increase...
Read More

It’s in the employee handbook. That’s the corporate way of saying, “Because I said so!”

Protection of intellectual property (IP) and compliance with regulatory and corporate governance policies is changing the way we communicate and collaborate in our everyday work life. Rules must be put in place to safeguard our proprietary data. Establishing corporate governance policies that dictate—yes, in this case, dictate is correct—is what all savvy organizations are doing to ensure that content is not only protected at rest…in transit…and in use, but also in compliance with all regulations. We all hate being...
Read More

Differentiation through compliance — It’s the new black!

  It’s hot. It’s the latest trend. It’s on point. It’s the positive correlation between implementing a cybersecurity compliance solution and a reduction in the number of cyberattacks. That means: Put content protection in your organization to meet compliance regulations, and you have a better chance of preventing data leakage of your confidential and proprietary intellectual property, emails and documents. It’s a strategy that sets you apart from the competition—and establishes you as conscientious and forward thinking. Meeting compliance regulations, reducing cyber...
Read More

Long live the king—content, that is! With cyber security culture protection

In September, the country was hit once again with a colossal data breach. This time, one of the country’s “kings” of Personally Identifiable Information (PII) was hit by a data breach impacting 143 million people. If it could happen at Equifax, it can happen anywhere. Will this be the straw that breaks the camel’s hack—I mean, back? On October 2, we began observing the 14th annual National Cyber Security Awareness Month (NCSAM). A little late for Equifax. We can only...
Read More

Prescription for the ailing healthcare industry

It’s not: “take two aspirin and call me in the morning” It is: STOP being a prime target for data breaches Are you aware of these alarming statistics? Over 100 million healthcare records from more than 8,000 devices in more than 100 countries were compromised in 2015.[1] Data breaches cost the healthcare sector $6.2 billion—with nearly 8 out of 10 healthcare institutions hit by 2 or more data breaches in the last 2 years and 45% affected with more than 5 breaches.[2] Nearly...
Read More

How to Use Data Analytics to Detect and Deter Company Breaches & Hacks

In this day and age of Big Data, enterprises are leveraging a large amount of information from a variety of sources to make critical business decisions that drive profits and growth. A medium–size network with 20,000 devices (e.g., laptops, smartphones, and servers) is said to transmit more than 50 TB of data in a 24–hour period. After capturing and collating this large amount of data, companies often need to share the information across multiple departments electronically so further insights can be...
Read More

Are you minding the gap? The cybersecurity skills gap, that is.

It used to be that when you heard or saw ‘mind the gap,’ you knew it was the familiar London tube warning to carefully step over the space between the station platform and the train car. A gap is never a good thing. Oh, how things have changed. Today, everyone’s talking about minding the gap—but not in transportation—in cybersecurity. The digital world has changed how we think, what we do, and how we protect ourselves. Everything is data. Everything needs...
Read More

Crozdeck Infographic: “Is your business safe from hackers in 2017?”

Did WannaCry make your company want to cry? Did NotPeyta have you hoping that it was not your organization? With large-scale cyber-attacks, such as hacking, malware and unintended disclosures, becoming more frequent and severe in 2017, there has never been a better time to invest in solutions that protect your customers’ data and reputation while mitigating potential risks. Check out the recent infographic from the IT & Security team at Crozdesk and learn about how solutions like GigaTrust are...
Read More

Keeping Your Emails and Documents Safe

Original article published on VPNMentor. The vast majority of our confidential information today is stored in emails and in documents. That is why GigaTrust is dedicated to making it both easy and safe to share these documents. Their GigaCloud collaboration platform not only encrypts emails/documents at rest and in transit, but also provides in use protection by manually or automatically applying usage rights In this interview with Robert Bernardi, the founder, chairman, president, and CEO of GigaTrust, we not only discuss the...
Read More

What US Businesses Need To Know About the GDPR Law

Excerpt: EU’s GDPR law will go into effect in May 2018 and will affect many US-based businesses. Here’s what you need to know and what to do to stay compliant.   If your organization processes any kind of personal data, you’ll need to assess how the EU’s GDPR law will affect your business. Even for companies based in the United States, it’s very likely that they have clients or customers who are EU citizens — which means this law will affect many...
Read More

Shark Week: 6 Tips to Secure Your IT Tackle Box

Original article published on VMBlog. Scientists recently dispelled the myth that sharks attack humans because they mistake them for other prey. In fact, sharks can see clearly below the murky waters. But, it’s not as easy for victims of phishing attacks to see what’s lurking behind an attached document or link within an email. Email is the lifeblood of communications for organizations around the world. Among the 296 billion emails sent daily, there are dangerous emails lurking within. A successful email attack...
Read More

How to Set Up Your Supply Chain Management to Comply with Special Publication NIST 800-171 Compliance

If you’re a contractor or sub-contractor to governmental agencies and organizations, you’ve probably heard of the government’s new mandate by the National Institute of Standards and Technology, NIST Special Publication 800-171 titled Protecting Controlled Unclassified Information (CUI) in Nonfederal Information Systems and Organizations. This special publication was created with the objective to protect information and communications technology (ICT) systems operated by the federal government and its contractors from cyber threats and attacks within the supply chain. This mandate was designed to protect sensitive government information from...
Read More

A Day in the Life of an Email

Ever wonder what your emails are up to when they aren’t protected by an endpoint security solution? GigaTrust has created an infographic that illustrates what “a day in the life of an email” actually looks like… and the threats that may occur if emails are not properly protected. Keep this in mind when sending, opening, forwarding and reading the next email to hit your inbox. Like this infographic? Use the below embed code to share. <h3>Share this Image On Your Site</h3><textarea...
Read More

Creating a Custom PowerShell DSC Resource

We’ve been using PowerShell Desired State Configuration (DSC) to automate the deployment of GigaCloud on Azure and on-premises Hyper-V virtual machines. Most of what we do with DSC comes from the open-source, Microsoft-supervised PowerShell DSC modules found on NuGet, and available to see at https://github.com/PowerShell. For some of our configuration tasks, though, we need custom functionality to get things installed and configured. For those, we’ve created DSC resources using PowerShell. The Script resource If you’re familiar with DSC, you’ll know about...
Read More

Prevent IT Security Breaches In Federal Government Environment with Cloud Collaboration Service

You don’t have to be an “insider” to know about all the IT security breaches that have affected the US government in recent years. The IRS was hacked in 2015 and tax records for 330,000 taxpayers were used to collect bogus refunds. More recently, the Russian hacker Rasputin has breached a total of 63 US and UK universities and US government agencies. Not to mention the 2016 DNC hack that involved the leak of 19,252 emails and 8,034 attachments that...
Read More

Creating a new forest and multiple domain controllers with PowerShell DSC

We’re continuing our series on automating the installation of GigaCloud using PowerShell DSC. GigaTrust is creating a fully automated solution to set up and install GigaCloud™ in whatever configuration our customers want: on-premises in Hyper-V and VMWare, in their own cloud subscriptions using Microsoft Azure, and even fully managed by GigaTrust as Software as a Service (SaaS). GigaCloud is deployed as a virtual appliance, with required services deployed across multiple virtual machines to provide redundancy and scale. To keep the...
Read More

Unstructured Data Sharing Is the Key to Ensure Productivity

Can we talk…candidly? If our question stopped at “Can we talk?” we’d be referring to the humorous hallmark catchphrase of Joan Rivers, one of the world’s top comedians. But when we add the word “candidly,” the humor evolves into the harsh reality for over billions of corporate and government email users worldwide who need to have digital candid conversations with employees, supply chain partners and other external participants, while maintaining privacy. Are you able to have a candid email conversation...
Read More

Applying Unattend.xml files using Desired State Configuration

GigaTrust™ is creating a fully automated solution to set up and install GigaCloud™ in whatever configuration our customers want: on-premises in Hyper-V and VMWare, in their own cloud subscriptions using Microsoft Azure, and even fully managed by GigaTrust as Software as a Service (SaaS). Because GigaCloud is based on Microsoft’s Rights Management Services, we need a number of servers installed in a scalable, redundant fashion, running services including Active Directory Domain Services, Rights Management Services, Windows Software Update Service, Active...
Read More

Keeping the Secret Recipe Safe: Why John Podesta’s Risotto Matters to Security Professionals Everywhere

The right ingredients for improved email protection are essential, now more than ever If you add ¼ to ½ cup of liquid at a time—you can get creamy risotto. How do we know this secret? The same way everyone in the world knows. John Podesta’s private email account was victim of a hack and data breach. It started with a spear phishing email sent to the Chairman of the Clinton Campaign’s DNC email account on March 19, 2016. It’s the...
Read More