Adding Data Security to Your Off-Boarding Checklist

Every time an employee leaves the company, whether willingly or unwillingly, HR has a checklist to complete. Not only are you responsible for coordinating their departure and replacement with their team, supervisor, and subordinates, but there is also an incredible amount of data management to do. This was one of your flock, one of the […]

Read More

What if your data could talk?

Digital transformation and how to listen to your data It is estimated that 80% of organisations are currently undertaking or planning some form of business or digital transformation, with the aim of increasing revenues, improving efficiency, managing risks and reducing costs. While these efforts can be absolute game-changers for businesses and many of the strategies […]

Read More

Encrypt Everything!? Maybe not.

I was working as a Security Architect when the Director of Strategy and Architecture made the announcement that our latest strategy was to “Encrypt Everything”. This was a telecoms company with a distributed IT infrastructure, thousands of staff, and a huge number of networks. The volume of confidential documents created daily numbered in the thousands, […]

Read More

Organisations must reconsider how they protect data

By Ted Pretty A new IDC Perspective entitled Is Data the New Endpoint(1) proposes that organisations need to change how they think, and instead view data itself as an endpoint to improve how it can be secured. The report states that: “Data is an asset that is increasing in value, created and stored in an […]

Read More

Perimeter Security – A Cycle of Failure

The manner in which enterprises conduct business has changed drastically over the past two decades, but approaches to security have not. During the advent of e-commerce, businesses focused on network firewalls, system hardening and network intrusion detection systems to protect web servers from compromises or denial of service attacks. As businesses made this environment more […]

Read More

The Vocabulary of Risk

We find ourselves doing it all the time – using the word “risk” as a catchall for everything related to data breaches. As board-level discussions about data security become increasingly common, it’s important for us to be precise in our language so we can better communicate the need for action as it relates to improving […]

Read More

Calculate risk in under two minutes

Data breaches are here to stay and becoming more frequent and larger scale (see this infographic for examples). Data breaches are so front of mind that we risk becoming desensitized to it – we’ve seen this firsthand. Privacy compliance issues can be on such a massive scale that organizations fail to take action because they […]

Read More

The backdoor to GDPR violations

By now you’ve heard about the General Data Protection Regulation (GDPR), the new European Union privacy regulation. The goal of GDPR is to protect the privacy of personal data given the rapidly increasing collection, analysis, storage and sharing of personal information. To meet the goal for strong protection of personal data, some businesses will focus […]

Read More