CloudMask Team
Recent Posts
Data security and privacy compliance and competitiveness are one in the same for law firms. For better or worse, whether lawyers love it or hate it, technology is now a fundamental aspect of the legal sector. While the reliance on IT isn't new in law by any means, modern technologies such as cloud computing, mobile devices, and software-as-a-service solutions now play...
The ITAR (International Traffic in Arms Regulations) legislation details what measures businesses and individuals must take to comply with ITAR requirements and specifies severe penalties, both civil and criminal, for non-compliance. The reach of the regulations is broad and suppliers of all kinds may be subject to requirements to keep sensitive information secure and...
American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in...
June 14, 2017
Leave a comment
Data Sovereignty,
data residency,
Cloud threats,
encryption
By CloudMask Team
Data security is one the most important aspects of digital business in today's IT ecosystem, as organizations continue to experience breach after breach. Unfortunately - like other technological solutions - enterprises, individuals and other entities are often confused by, uncertain of or misunderstand technobabble, system specifications and certificates. After all,...
The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, financial data and legal records. When your business stores or processes this information and when it can be linked to a particular...
The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge. For decades, organizations have kept control over their data and customers' information as it was simply stored in on-premise data centers. Now, cloud services are the de...
This article is the second of a series that explores data breach risks and issues related to regulatory compliance, associated costs and loss of reputation. In “Threats and Consequences” we look at the types of cyber threats and what the consequences might be for businesses that suffer data breaches. As described in the first article of the series, “What You Need to Know
Data manipulation could mean disaster for corporations, health care providers, national security agencies and individuals around the world. Businesses and consumers both invest time and money into securing private information, but too often, the focus is on preventing hackers from accessing data and therefore ensuring that sensitive information, trade secrets and...
Reports of data protection fails against insiders, compromised cybersecurity and data breaches are becoming more frequent, even at large corporations and the government. But these events are not all the same. You can analyze them and, by classifying the data breaches based on how they happened, you can develop effective countermeasures. One way data breaches occur is...
If you work in the law profession or are an IT professional responsible for law firm records, you know to what extent your business depends on the ability to keep sensitive client information confidential. The issues raised by storing law firm client data digitally are data security, data accessibility and the maintaining of legal privilege. When you store client...