<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Your Liability for 3rd Party Data Breaches

The discussion of data breach liability is complex. In the Wired article “The Crooked Path to Determining Liability in Data Breach Cases “ highlights the complexity of this issue. Hackers target the weakest link along the chain of entities that protect customer data. Because the harm from data breaches falls to each party not just the party that failed to implement...

Living the Age of Hackers Anxiety

Many consumers and business are anxious about the security of their information, both on their own devices and on business networks. While they worry about being hacked, they continue to engage in risky activities. According to a recent survey published by Arbor Networks, 75% of adults say they are concerned about their security, privacy, malware and websites tracking...

What Does 'Making America Great Again' Mean to Data Privacy?

The Commander in Chief promises to “make America great again”. Issues like American jobs and national security are top priorities for U.S President, Donald Trump. As his agenda begins to manifest, Toyota found itself in hot water. The car company was publically criticized by Mr. Trump for its plans to invest in a new plant in Mexico. Their stocks immediately plummeted by...

The cost of data security: Are cybersecurity investments worth it?

Where is the evidence that current cybersecurity spending works? Cybersecurity and data breaches continue to make headlines as businesses and associations around the world fall victim to network intrusion and data theft. However, some organizations are still hesitant to just start spending thousands of dollars upgrading their security systems and improving data...

CloudMask to Exhibit at RSA 2017

Please come by and chat with us at South Hall #2820 - Use discount code XE7CANADA1 for free expo entry – a $175 value CloudMask is a patented SaaS security platform, running on Endpoint, transparently intercepts and analyzes data to identify and mask private information. The intercepted data may belong to...

Think Security Best Practices Can Keep Your Data Safe? Think Again

The application of best practices to a business process can give you the results you want. For example, quality assurance best practices result in the specified level of product quality and best practices in manufacturing reduce the number of product defects. Applied to data security, best practices can keep the data on your computer and mobile devices safe as long as it...

What does it mean to have a cybersecurity certification?

If businesses are certified in a certain category, they earn the right to flaunt that achievement in hopes of it attracting clients.if businesses are certified in a certain category, they earn the right to flaunt that achievement in hopes of it attracting clients. Since cybercrime is clearly not going away anytime soon, the business world must now deal with data...

Where are your encryption keys and who has control over them?

All entities should ask “Who controls the key?” when using encryption services. Data breaches have become far too common, and as a result, the world is smartening up in regard to cybersecurity. While organizations have acquired and deployed numerous data protection tools and services, one method stands out from the rest: encryption. In fact, encryption is so powerful...

Meet Your Legal Obligations – Part 2 Protecting Client Confidentiality

Part I of this series, “A shifting Legal Landscape” looked at the changing business environment and the need for secure data access. It then discussed the threats to client confidentiality that accompany such technological changes. Part II, “Protecting Client Confidentiality to Meet Ethical Obligations,” suggests a way you can protect yourself against these threats and...

Meet Your Legal Obligations - Part 1: A Shifting Legal Landscape

This two-part series explores how information security enables and helps expand your practice by utilizing available cloud resources. Part one explores the changing business environment and the need to collaborate in a simpler, controlled and secure way. Part two discusses the technology changes, the risks of using technology and how to mitigate these risks. A Shifting...