CloudMask Team
Recent Posts
Data Masking as a Solution to Password Weaknesses Password-based data protection is the most common form of data protection, but it is increasingly weak. If you think your data is secure because your organization insists on strong passwords, you are increasingly likely to be wrong. Better software tools running on powerful processors can try millions of character...
February 09, 2017
Leave a comment
New Security Paradigm,
Breach,
Password,
Data Masking,
data privacy,
cyber threats
By CloudMask Team
February 3, 2017, US Magistrate Judge Thomas Rueter ruled that Google must provide emails stored overseas to US authorities for domestic investigations. On August 2016, courts issued two search warrants, which required Google to disclose, to the FBI, electronic data held in the accounts of the two accused of fraud in violation of federal law. Google only provided data...
What Is Wrong With Passwords-based data protection? Today, Password-based data protection is the foundation of 99% of data protection. It’s ubiquitous: you want access to an account or information, so you type your username and password, and you can get in. For critical and restricted information, you might have to do it again, with a different password. Your company’s...
February 06, 2017
Leave a comment
Password,
Data Masking,
data privacy,
cyber threats
By CloudMask Team
The Commander in Chief promises to “make America great again”. Issues like American jobs and national security are top priorities for U.S President, Donald Trump. As his agenda begins to manifest, Toyota found itself in hot water. The car company was publically criticized by Mr. Trump for its plans to invest in a new plant in Mexico. Their stocks immediately plummeted by...
January 19, 2017
Leave a comment
Google,
Data Masking,
User Privacy,
Government surveillance,
data privacy
By CloudMask Team
Please come by and chat with us at South Hall #2820 - Use discount code XE7CANADA1 for free expo entry – a $175 value CloudMask is a patented SaaS security platform, running on Endpoint, transparently intercepts and analyzes data to identify and mask private information. The intercepted data may belong to...
Data protection issues have come center stage as organizations move from legacy applications to those that store and manipulate data in a hybrid environment. Previously, IT security specialists sought to protect the boundaries of their networks and provide reliable perimeter security. Anything inside the perimeter was trusted and what was outside was not. This mindset led...
October 12, 2016
Leave a comment
New Security Paradigm,
Data Masking,
cloud computing
By CloudMask Team
Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. ...
People in charge of ensuring data privacy policies have an increasingly hard task. Your employees want to use mobile devices to access data. Data storage in the cloud is inexpensive and convenient. At the same time you want to keep customer and employee data secure and you face tough privacy laws. The conflicting issues directly affect your business. If competitors have...
Sensitive patient records held by healthcare organizations have to be stored and processed securely, both to guard the patients’ privacy and to comply with government regulations. As a healthcare provider responsible for patient information, you have to be able to detail what measures you are taking to safeguard patient data and you have to show that these measures are...
May 11, 2016
Leave a comment
Compliance,
Healthcare,
data privacy,
cyber threats,
encryption
By CloudMask Team
Mitigating the Risk of Data Breaches with Tokenization When handling sensitive data such as financial records or personal health information, companies must reduce the risk of data breaches to a minimum by addressing possible sources of risk. Without a comprehensive strategy for reducing data breach risks and mitigating their effect, companies risk damaging their...