Blog Banner

Is Your Intellectual Property Going for a Walk?

Decorative image of man typingDo you know if your intellectual property is going for a walk? The chances are it is. One in five employees are going rogue with corporate data according to a Help Net Security article reporting findings from a Vanson Bourne survey. According to the article, these employees have “uploaded proprietary corporate data to a cloud application, such as Dropbox or Google Docs, with the specific intent of sharing it outside of the company.”

Worried? You should be. The article reported that 66% of users are able to access those cloud storage applications after leaving their last job – even though 60% of employees were aware that their employer strictly forbids taking intellectual property (IP) after leaving the company. One in four admitted they would take copies of corporate data with them when leaving a company.

Chris McNulty’s On Demand Webinar on Securing Office 365

Control Key on Computer KeyboardSharePoint has come a long way since 2001. As the next generation, SharePoint Online, gains momentum with Office 365, security admins need to rethink their approaches to securing sensitive information.

Understanding the Structure of WCAG 2.0

Decorative image of Web, WCAG and Accessibility wordsSince the WCAG 2.0 standard was published by the World Wide Web Consortium (W3C) in December 2008, it has since become the de facto guideline for basing global Web accessibility standards. This is for good reason – WCAG 2.0 substantially improves the end-user experience for people with disabilities. Instead of providing a minimal level of accessibility, WCAG 2.0’s goals were to level the differences between users with and without disabilities as much as possible. The structure of WCAG 2.0 is based on ensuring that four principles are met – content should be perceivable, operable, understandable and robust for all users regardless of disability.

2015 Compliance Predictions

Decorative image of 2015Highly regulated industries from healthcare and financial services to government agencies have had to make compliance part of the bread and butter of the organization. Now with increased global regulation, public and private companies, regardless of industry, are facing the same compliance requirements – with good reason. Consumer data is valuable, and with both malicious and accidental breaches occurring regularly, both customers and governments are demanding protection. In 2015, new regulations, changes to compliance requirements and general trends will change many markets. Here are some of our predictions.

Happy New Year from Cryptzone & HiSoftware

Decorative Image of 2015 Happy New YearWe hope 2015 is a year of abundant success and joy. Have a wonderful New Year!

We’ve already started working on new content for 2015. We have some predictions and New Year’s resolutions that we’ll be posting in the coming weeks.

Have a very happy New Year and come visit us in 2015 to stay abreast of the latest compliance and security trends for 2015.

Holiday Wishes and Reflections on 2014

Wishing you Happy HolidaysIt’s hard to believe another year has come and gone. 2014 has been an exciting year. Most notable, Cryptzone and HiSoftware announced a merger. The last few months has been a flurry of activity as we look to create a unified company and set of products that are unrivaled in the industry.

We also launched a few new products including AppGate Version 11.0 which delivers a unique approach to Citrix and Terminal Server access control, HiSoftware Site Sheriff Version 2.0 for dynamic access and permission in SharePoint, and HiSoftware Compliance Deputy to allow developers to test content prior to publication in their browser.

Data Privacy Lessons Learned from 2014

Decorative image, hand covering the word privacyWhen we look back in a few years, some might consider 2014 the year of the data breach. High profile breaches of brands like Michaels, Sally Beauty, Neiman Marcus, Dairy Queen and Home Depot are the names you think of instantly. It might surprise you to learn that there have been a reported 720 breaches, representing a 24.8 percent increase over the same time period last year according to Identify Theft Resource Center.

California Data Breach Report Says Encryption for Healthcare is a Must

Decorative image of gray padlockAt the forefront of privacy and security issues, California has recently released its 2014 California Data Breach Report. Detailed within the report is an overview of the damaging data breaches impacting California as well as the state’s nine recommendations for data security. Why should we care about what California is doing?

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Meet HiSoftware/Cryptzone at SharePoint Fest Chicago 2014

SharePoint Fest LogoSharePoint Fest Chicago 2014 starts next week! HiSoftware/Cryptzone will be exhibiting at booth #39 to showcase our solutions to rein in compliance and secure sensitive content in SharePoint for improved collaboration.

Our CTO, Chris McNulty, Microsoft SharePoint MVP is also presenting three sessions including:

Pre-conference Workshop: Full Day Workshop: WS 103 – SharePoint 2013/Office 365 Admin MasterClass

Powered by WordPress