Blog Banner

Section 508 Comments Wanted

Access Board LogoThe Access Board has now issued its Section 508 Notice of Proposed Rulemaking (NPRM). While the rule is unusually short, the bulky analysis makes it a hefty read—about 204 pages in total! As I predicted in a previous post, the Access Board is taking some controversial positions—and this will incur a bunch of delays.

Cryptzone & HiSoftware on Keeping PII Secure in the Age of Cyber Attacks @IAPP

Logo of IAPP Global Privacy SummitFact: You need to secure personally identifiable information (PII).

Myth: You have it covered.

Every day we hear about a new data breach or cyber attack. It is enough to make you never want to use the Internet again. But we all know that is not going to happen (there are three billion internet users today). During work and play, the Internet needs to be secured. Organizations must keep PII about their customers and employees safe.

Fact: You can secure PII using some practical strategies that avoid some common mistakes.

Myth: You have it covered.

HiSoftware & Cryptzone Share Activities Planned for CSUN 2015

CSUN LogoCSUN is always much anticipated by the accessibility community, offering an inclusive setting for researchers, practitioners, exhibitors, end users, speakers and other participants to share knowledge and best practices in the field of assistive technology. With the release of the Access Board’s NPRM for Section 508 last week, the Access Board announced it will be holding a series of hearings with the first slated in San Diego during CSUN next week, making the event a pivotal step in the approval process.

Where in the World is Chris McNulty (This Winter!)

Decorative image of globeWe’ve started a tradition of playing where in the world is Chris McNulty? This winter Chris will be getting out of the Boston snow headed for some cool events. Here is a list of where you can find Chris to hear him talk about all things SharePoint and Office 365!

Access Board to Release the NPRM for Section 508 Regulations

Decoartive image of wordle focused on Accessibility GuidelinesOver the President’s Day weekend, some of our colleagues on the Access Board informed us that it would release the Notice of Proposed Rulemaking (NPRM) for the upcoming Section 508 regulations on Wednesday this week. While there has been a lot of grumbling about the delay in getting the rule out, this event is enormously important. As I worked with the Access Board in getting the original Section 508 rule out when I was at the Justice Department back in 2000, I thought I would offer my thoughts about this news.

Securing Sensitive Information in Office 365

Screen shot of results viewer in Security Sheriff

Shows the Office 365 library with the Privacy module deployed and pass/fail results for the files displayed

Microsoft’s quarterly earnings call at the end of January touted strong demand for its cloud services. Commercial revenue grew 5 percent to $13.3 billion, driven by Office 365, Azure, and Dynamics CRM Online.

Office 365 is growing rapidly. Public disclosures from Redmond reveal a triple digit growth rate, and an annual revenue run rate above $2.5 billion. Office 365 is a collaboration tool enabling you to create, store and work together on content. Organizations are opting to work with Microsoft to help control their enterprise collaborative content. However, these organizations need to understand where users save sensitive data and who is using it, so it can automatically be secured.

Today we announced HiSoftware Security Sheriff for Office 365, which extends the features and functions of our on-premises solution for inspecting, classifying, securing, auditing and processing content to Office 365, SharePoint Online, OneDrive and hybrid environments.

Our CEO, Kurt Mueffelmann said in today’s announcement, “The SharePoint capabilities of Office 365 make it simple to create content and share it with a global audience. However, its ease of collaboration and the resulting upsurge of content also come with increased risk. We recently surveyed SharePoint users during a webinar, and 81% of respondents said user mistakes have been the leading source of actual damage from breaches. Security Sheriff provides organizations with the ability to apply granular security controls around content, to limit the damage that can be done by unfettered collaboration.”

Security Sheriff for Office 365 uses our full-text, high-speed policy scanning for real-time monitoring and control of the full document information lifecycle. We’re also finding enterprises planning cloud-centric or exclusive use of the cloud with Office 365. To support this model, Security Sheriff is now available on Microsoft Azure, giving organizations the flexibility to deploy best of breed compliance without any legacy on premises servers.

Screen Shot of Screen shot of Site Sheriff View Results

Screen shot of Site Sheriff View Results

More information can be found online. You can also stop by and visit us at the HiSoftware booth (#702) during SPTechCon in Austin, Texas, from Feb. 8-11, 2015 to discuss more about Security Sheriff for Office 365.

HiSoftware Sheriff and Chris McNulty to Arrive in Austin for SPTechCon

Logo for SPTechCon TexasNext week, the Sheriff is in town at SPTechCon in Austin Texas. HiSoftware and Cryptzone (if you haven’t heard we’re merging) will offer advice on how to keep SharePoint content secure while maximizing your investment in the collaboration platform. Head on over to the HiSoftware/Cryptzone Booth (702) to learn more about our award-winning solutions for secure collaboration and what we have in store for Office 365 – check our blog for the announcement on Feb 9th.

Is Your Intellectual Property Going for a Walk?

Decorative image of man typingDo you know if your intellectual property is going for a walk? The chances are it is. One in five employees are going rogue with corporate data according to a Help Net Security article reporting findings from a Vanson Bourne survey. According to the article, these employees have “uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.”

Worried? You should be. The article reported that 66% of users are able to access those cloud storage applications after leaving their last job – even though 60% of employees were aware that their employer strictly forbids taking intellectual property (IP) after leaving the company. One in four admitted they would take copies of corporate data with them when leaving a company.

Chris McNulty’s On Demand Webinar on Securing Office 365

Control Key on Computer KeyboardSharePoint has come a long way since 2001. As the next generation, SharePoint Online, gains momentum with Office 365, security admins need to rethink their approaches to securing sensitive information.

Understanding the Structure of WCAG 2.0

Decorative image of Web, WCAG and Accessibility wordsSince the WCAG 2.0 standard was published by the World Wide Web Consortium (W3C) in December 2008, it has since become the de facto guideline for basing global Web accessibility standards. This is for good reason – WCAG 2.0 substantially improves the end-user experience for people with disabilities. Instead of providing a minimal level of accessibility, WCAG 2.0’s goals were to level the differences between users with and without disabilities as much as possible. The structure of WCAG 2.0 is based on ensuring that four principles are met – content should be perceivable, operable, understandable and robust for all users regardless of disability.

Powered by WordPress