CloudMask Team
Recent Posts
Protecting your client data and be compliance with Data Privacy Laws is one of the main concerns for SMEs. SMEs face particular conditions when they set out to use IT to streamline their operations. Some key conditions are Their IT budgets are small, and they may not have very specialized manpower They may not have the capability to implement complex security solutions ...
Tokenization is the process of replacing a sensitive data element with a random equivalent, referred to as a token that has no extrinsic or exploitable meaning. The token is a reference that maps back to the original sensitive data through a tokenization system. Both original sensitive data and token are stored encrypted in a secure database. Reversing this process by...
March 01, 2016
Leave a comment
Data Sovereignty,
Data Masking,
Tokenization,
cyber threats,
encryption
By CloudMask Team
As increasing amounts of critical and sensitive data comes to be stored with businesses and consequent to some situations where significant amounts of data have been lost or stolen, regulatory pressure to ensure protection of sensitive data continues to increase. As new threats are discovered, we can expect regulations to get tighter. Requirements will continue to change...
Over the years, Google has emerged as the world’s largest collaboration and business use platform. It has nearly a billion subscribers and a complete application ecosystem that comprises email, file storage, calendar, office applications and business collaboration capabilities. Most of these services can give small and medium businesses capabilities that match those only...
January 27, 2016
Leave a comment
Google,
Data Masking,
User Privacy,
Government surveillance,
Cloud threats,
data privacy
By CloudMask Team
This is the first part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. Businesses are often worried about security and control over their data as they plan a move to the Cloud. This worry is often justified because some risks have proven to be real. CloudMask helps you...
Hackers will target organizations in an attempt to steal intellectual property, business strategies and other sensitive, mission-critical information. As cybercrime rapidly advances alongside the development of technologies in the business world, it is certain that hackers will target high-value organizations in an attempt to steal intellectual property, business...
December 12, 2015
Leave a comment
New Security Paradigm,
Breach,
Data Masking,
cyber threats
By CloudMask Team
MITC attcks allow cybercriminals to access data and documents stored in popular file synchronization services such as Google Drive. Cloud storage has slowly but surely become the best method for sharing, backing up and remotely accessing data in all forms, from Word documents to movies to sensitive, personally identifiable information. So, given Google's position in...
Consumers and organizations should be worried about their cyberprivacy and data security if the CISA bill passes Senate this week. With the U.S. Senate set to go on recess for the remainder of the summer, consumers and Internet users rejoiced, assuming that the judgment over the Cybersecurity Information Sharing Act would be delayed to the fall. This would give...
Thanks to modern technologies, shadow IT in full swing and IT departments are struggling to shine light on unauthorized cloud app usage. From malware to phishing, enterprise IT often turns to interesting terminology to identify and label cybersecurity threats. Shadow IT is no exception to this rule, as the phrase describes the unauthorized use of software, hardware...
July 22, 2015
Leave a comment
Shadow it,
insider threats,
cyber threats,
governance
By CloudMask Team
Common sense security says it’s no secret that when we go online, we take the risks of entering a war-zone. Cyberspace remains a domain of commerce in which rule of law is still emerging. As it relates to physical property, movement across the seas, or navigating in the skies, the law is well established, defined and enforced. But law and its enforcement in...