Blog Banner

Data Privacy Lessons Learned from 2014

Decorative image, hand covering the word privacyWhen we look back in a few years, some might consider 2014 the year of the data breach. High profile breaches of brands like Michaels, Sally Beauty, Neiman Marcus, Dairy Queen and Home Depot are the names you think of instantly. It might surprise you to learn that there have been a reported 720 breaches, representing a 24.8 percent increase over the same time period last year according to Identify Theft Resource Center.

California Data Breach Report Says Encryption for Healthcare is a Must

Decorative image of gray padlockAt the forefront of privacy and security issues, California has recently released its 2014 California Data Breach Report. Detailed within the report is an overview of the damaging data breaches impacting California as well as the state’s nine recommendations for data security. Why should we care about what California is doing?

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Meet HiSoftware/Cryptzone at SharePoint Fest Chicago 2014

SharePoint Fest LogoSharePoint Fest Chicago 2014 starts next week! HiSoftware/Cryptzone will be exhibiting at booth #39 to showcase our solutions to rein in compliance and secure sensitive content in SharePoint for improved collaboration.

Our CTO, Chris McNulty, Microsoft SharePoint MVP is also presenting three sessions including:

Pre-conference Workshop: Full Day Workshop: WS 103 – SharePoint 2013/Office 365 Admin MasterClass

An Exciting Week at Accessing Higher Ground

AHG LogoJeff Singleton, Doug Johnson, and I attended the Accessing Higher Ground (AHG) conference in Westminster, just outside Boulder, Colorado last month. I’ve been attending AHG for over a dozen years and this year’s conference was easily the busiest and most exciting yet. In the time that I’ve been to AHG, I’ve seen it blossom from a small conference at the University of Colorado into one of the biggest and best conferences for IT accessibility in higher education. Howard Kramer from the University of Colorado has been at the helm throughout its development. It’s been a great pleasure to work with Howard over the years. He takes a genuine interest in making each session great for all of the attendees—and his conference sessions have inspired and networked countless others who are also changing the world. It also doesn’t hurt that he has to be one of the nicest and most patient guys in our field.

WCAG 2.0 Should Not Be Applied to Software and Mobile Apps

Decorative image of access key on keyboard

I have growing concerns about the application of the W3C Web Content Accessibility Guidelines (WCAG) 2.0 to software and particularly mobile apps.

WEBINAR: Extending Your Data Security Controls to Office 365

Decorative image of cableThe ease of access and availability of Office 365 has made it a compelling platform for many enterprises, in addition to its cost advantages. But it also brings many challenges. Is it safe to store confidential information in the cloud? How can it be secured? Can data protection policies be centralized across on-premises and Cloud environments?

HiSoftware has a tradition of automating compliance and security governance on-premises. Join SharePoint MVP Chris McNulty on Tuesday, December 9, 2014 at 11:00am EST/4:00pm GMT for a review of how you can seamlessly extend the same automatic policies and controls from your on-premises SharePoint environment to Office 365.

Keeping Data Safe This Black Friday

Decorative image of "E-Buy" Computer Key Tomorrow, most Americans will be enjoying Thanksgiving festivities with their family, celebrating what they are truly thankful for over a feast of plenty. However, the Friday after is a different story. While some might want to stay put and watch the shopping unfold on the news, others will be in the depths of shopping galore. And while I do like a little shopping myself, I’d like to take a minute to remind everyone about keeping data safe this black Friday.

High profile retail data breaches have also been of plenty over the last year. It was almost a year ago that Target was breached, and Sally Beauty, Neiman Marcus, Michaels, Kmart and Home Depot have all recently suffered data breaches that exposed their customers’ personal and payment card data. With billions to be spent on Black Friday, and a lot of that spent via credit and debit cards, retailers are responsible for a whopping amount of personally identifiable information (PII) and financial information.

Section 508 Coordinators, HiSoftware and Microsoft Discuss SharePoint Accessibility

Decorative image of access key on keyboardLast week, I was in Washington, DC for Global Accessibility Day, a gathering of the Section 508 coordinators brought together by Microsoft to discuss SharePoint accessibility.

Some of you may not know that I was one of the attorneys responsible for surveying all of the Federal agencies and developing the report on Section 508 compliance to the President and the Congress. I worked with a number of 508 Coordinators to create many portions of that survey. During that time, I also became acutely aware of the challenges that they face. They all want to make their agencies accessible and provide opportunities for people with disabilities, but face a constant uphill battle to get accessibility recognized by their leadership.

What Every Business Can Learn from Snowden

Decorative image of 4News out that there is a second or even third leaker turning sensitive documents about the U.S. government’s terrorist watch list to a journalist reminds us all about the security of information. With this in mind, today we focus on what every business can learn from Snowden.

While you may not be keeping national secrets, content is the bread and butter for any organization. It might be customer information, HR details, intellectual property (IP) or financial and commercial information. For organizations to get the most out of content, we collaborate on it. We have it stored in platforms like SharePoint or in file shares. It is online, offline, in the cloud, on our desktops or mobile devices. We need it to achieve an end goal.

Powered by WordPress