<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

CloudMask Team

Recent Posts

Turn regulatory headaches into a competitive advantage

Data security and privacy compliance and competitiveness are one in the same for law firms. For better or worse, whether lawyers love it or hate it, technology is now a fundamental aspect of the legal sector. While the reliance on IT isn't new in law by any means, modern technologies such as cloud computing, mobile devices, and software-as-a-service solutions now play...

ITAR compliance: ignorance is no excuse

The ITAR (International Traffic in Arms Regulations) legislation details what measures businesses and individuals must take to comply with ITAR requirements and specifies severe penalties, both civil and criminal, for non-compliance. The reach of the regulations is broad and suppliers of all kinds may be subject to requirements to keep sensitive information secure and...

Should You Encrypt Data Before it Goes to the Cloud?

American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in...

Security certifications (part 1): What are the differences?

Data security is one the most important aspects of digital business in today's IT ecosystem, as organizations continue to experience breach after breach. Unfortunately - like other technological solutions - enterprises, individuals and other entities are often confused by, uncertain of or misunderstand technobabble, system specifications and certificates. After all,...

How to reduce the consequences of Data Breach

The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, financial data and legal records. When your business stores or processes this information and when it can be linked to a particular...

How can we use the cloud and comply with global privacy laws?

The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge. For decades, organizations have kept control over their data and customers' information as it was simply stored in on-premise data centers. Now, cloud services are the de...

Data Breaches: Threats and Consequences

This article is the second of a series that explores data breach risks and issues related to regulatory compliance, associated costs and loss of reputation. In “Threats and Consequences” we look at the types of cyber threats and what the consequences might be for businesses that suffer data breaches. As described in the first article of the series, “What You Need to Know

Is data manipulation the next step in cybercrime?

Data manipulation could mean disaster for corporations, health care providers, national security agencies and individuals around the world. Businesses and consumers both invest time and money into securing private information, but too often, the focus is on preventing hackers from accessing data and therefore ensuring that sensitive information, trade secrets and...

How Data Protection Can Fail Against Insiders

Reports of data protection fails against insiders, compromised cybersecurity and data breaches are becoming more frequent, even at large corporations and the government. But these events are not all the same. You can analyze them and, by classifying the data breaches based on how they happened, you can develop effective countermeasures. One way data breaches occur is...

Maintaining Law Firm Client Confidentiality with Cloud Masking

If you work in the law profession or are an IT professional responsible for law firm records, you know to what extent your business depends on the ability to keep sensitive client information confidential. The issues raised by storing law firm client data digitally are data security, data accessibility and the maintaining of legal privilege. When you store client...