Blog Banner

Happy New Year from Cryptzone & HiSoftware

Decorative Image of 2015 Happy New YearWe hope 2015 is a year of abundant success and joy. Have a wonderful New Year!

We’ve already started working on new content for 2015. We have some predictions and New Year’s resolutions that we’ll be posting in the coming weeks.

Have a very happy New Year and come visit us in 2015 to stay abreast of the latest compliance and security trends for 2015.

Holiday Wishes and Reflections on 2014

Wishing you Happy HolidaysIt’s hard to believe another year has come and gone. 2014 has been an exciting year. Most notable, Cryptzone and HiSoftware announced a merger. The last few months has been a flurry of activity as we look to create a unified company and set of products that are unrivaled in the industry.

We also launched a few new products including AppGate Version 11.0 which delivers a unique approach to Citrix and Terminal Server access control, HiSoftware Site Sheriff Version 2.0 for dynamic access and permission in SharePoint, and HiSoftware Compliance Deputy to allow developers to test content prior to publication in their browser.

Data Privacy Lessons Learned from 2014

Decorative image, hand covering the word privacyWhen we look back in a few years, some might consider 2014 the year of the data breach. High profile breaches of brands like Michaels, Sally Beauty, Neiman Marcus, Dairy Queen and Home Depot are the names you think of instantly. It might surprise you to learn that there have been a reported 720 breaches, representing a 24.8 percent increase over the same time period last year according to Identify Theft Resource Center.

California Data Breach Report Says Encryption for Healthcare is a Must

Decorative image of gray padlockAt the forefront of privacy and security issues, California has recently released its 2014 California Data Breach Report. Detailed within the report is an overview of the damaging data breaches impacting California as well as the state’s nine recommendations for data security. Why should we care about what California is doing?

Best Compliance and Security Resources of 2014

Decorative image of 2014It feels like we just started 2014, but somehow it is already December. With the year coming to a close, it is a great time to reflect back on lessons learned. Over the past year, we’ve blogged on topics ranging from data privacy, SharePoint security, Web accessibility, content compliance, HIPAA, ITAR and much more, to help any organization seeking to improve content compliance and security with suggestions on where to start, what to avoid and best practices.

As we wrap up another year, we thought we would share our top viewed blogs of 2014:

Meet HiSoftware/Cryptzone at SharePoint Fest Chicago 2014

SharePoint Fest LogoSharePoint Fest Chicago 2014 starts next week! HiSoftware/Cryptzone will be exhibiting at booth #39 to showcase our solutions to rein in compliance and secure sensitive content in SharePoint for improved collaboration.

Our CTO, Chris McNulty, Microsoft SharePoint MVP is also presenting three sessions including:

Pre-conference Workshop: Full Day Workshop: WS 103 – SharePoint 2013/Office 365 Admin MasterClass

An Exciting Week at Accessing Higher Ground

AHG LogoJeff Singleton, Doug Johnson, and I attended the Accessing Higher Ground (AHG) conference in Westminster, just outside Boulder, Colorado last month. I’ve been attending AHG for over a dozen years and this year’s conference was easily the busiest and most exciting yet. In the time that I’ve been to AHG, I’ve seen it blossom from a small conference at the University of Colorado into one of the biggest and best conferences for IT accessibility in higher education. Howard Kramer from the University of Colorado has been at the helm throughout its development. It’s been a great pleasure to work with Howard over the years. He takes a genuine interest in making each session great for all of the attendees—and his conference sessions have inspired and networked countless others who are also changing the world. It also doesn’t hurt that he has to be one of the nicest and most patient guys in our field.

WCAG 2.0 Should Not Be Applied to Software and Mobile Apps

Decorative image of access key on keyboard

I have growing concerns about the application of the W3C Web Content Accessibility Guidelines (WCAG) 2.0 to software and particularly mobile apps.

WEBINAR: Extending Your Data Security Controls to Office 365

Decorative image of cableThe ease of access and availability of Office 365 has made it a compelling platform for many enterprises, in addition to its cost advantages. But it also brings many challenges. Is it safe to store confidential information in the cloud? How can it be secured? Can data protection policies be centralized across on-premises and Cloud environments?

HiSoftware has a tradition of automating compliance and security governance on-premises. Join SharePoint MVP Chris McNulty on Tuesday, December 9, 2014 at 11:00am EST/4:00pm GMT for a review of how you can seamlessly extend the same automatic policies and controls from your on-premises SharePoint environment to Office 365.

Keeping Data Safe This Black Friday

Decorative image of "E-Buy" Computer Key Tomorrow, most Americans will be enjoying Thanksgiving festivities with their family, celebrating what they are truly thankful for over a feast of plenty. However, the Friday after is a different story. While some might want to stay put and watch the shopping unfold on the news, others will be in the depths of shopping galore. And while I do like a little shopping myself, I’d like to take a minute to remind everyone about keeping data safe this black Friday.

High profile retail data breaches have also been of plenty over the last year. It was almost a year ago that Target was breached, and Sally Beauty, Neiman Marcus, Michaels, Kmart and Home Depot have all recently suffered data breaches that exposed their customers’ personal and payment card data. With billions to be spent on Black Friday, and a lot of that spent via credit and debit cards, retailers are responsible for a whopping amount of personally identifiable information (PII) and financial information.

Powered by WordPress