<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

CloudMask Team

Recent Posts

Anatomy of Password-based Data protection – Part Two

Data Masking as a Solution to Password Weaknesses Password-based data protection is the most common form of data protection, but it is increasingly weak. If you think your data is secure because your organization insists on strong passwords, you are increasingly likely to be wrong. Better software tools running on powerful processors can try millions of character...

Google Is Hit With Another Blow to User Privacy: Here's What You Can Do

February 3, 2017, US Magistrate Judge Thomas Rueter ruled that Google must provide emails stored overseas to US authorities for domestic investigations. On August 2016, courts issued two search warrants, which required Google to disclose, to the FBI, electronic data held in the accounts of the two accused of fraud in violation of federal law. Google only provided data...

Anatomy of Password-based Data protection – Part one

What Is Wrong With Passwords-based data protection? Today, Password-based data protection is the foundation of 99% of data protection. It’s ubiquitous: you want access to an account or information, so you type your username and password, and you can get in. For critical and restricted information, you might have to do it again, with a different password. Your company’s...

What Does 'Making America Great Again' Mean to Data Privacy?

The Commander in Chief promises to “make America great again”. Issues like American jobs and national security are top priorities for U.S President, Donald Trump. As his agenda begins to manifest, Toyota found itself in hot water. The car company was publically criticized by Mr. Trump for its plans to invest in a new plant in Mexico. Their stocks immediately plummeted by...

CloudMask to Exhibit at RSA 2017

Please come by and chat with us at South Hall #2820 - Use discount code XE7CANADA1 for free expo entry – a $175 value CloudMask is a patented SaaS security platform, running on Endpoint, transparently intercepts and analyzes data to identify and mask private information. The intercepted data may belong to...

Data Protection and the new security paradigm

Data protection issues have come center stage as organizations move from legacy applications to those that store and manipulate data in a hybrid environment. Previously, IT security specialists sought to protect the boundaries of their networks and provide reliable perimeter security. Anything inside the perimeter was trusted and what was outside was not. This mindset led...

Is data security more important to consumers than physical well-being?

Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. ...

Effective Data Privacy Policies are the Key to Satisfying Privacy Laws

People in charge of ensuring data privacy policies have an increasingly hard task. Your employees want to use mobile devices to access data. Data storage in the cloud is inexpensive and convenient. At the same time you want to keep customer and employee data secure and you face tough privacy laws. The conflicting issues directly affect your business. If competitors have...

Cybersecurity Implementation for Health Care Records

Sensitive patient records held by healthcare organizations have to be stored and processed securely, both to guard the patients’ privacy and to comply with government regulations. As a healthcare provider responsible for patient information, you have to be able to detail what measures you are taking to safeguard patient data and you have to show that these measures are...

Mitigating the Risk of Data Breaches with Data Masking

Mitigating the Risk of Data Breaches with Tokenization When handling sensitive data such as financial records or personal health information, companies must reduce the risk of data breaches to a minimum by addressing possible sources of risk. Without a comprehensive strategy for reducing data breach risks and mitigating their effect, companies risk damaging their...