<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

End-to-End Google Security with CloudMask

Over the years, Google has emerged as the world’s largest collaboration and business use platform. It has nearly a billion subscribers and a complete application ecosystem that comprises email, file storage, calendar, office applications and business collaboration capabilities. Most of these services can give small and medium businesses capabilities that match those only...

Part 1: What are Cloud Risks and how to manage them?

  This is the first part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. Businesses are often worried about security and control over their data as they plan a move to the Cloud. This worry is often justified because some risks have proven to be real. CloudMask helps you...

Modern cyberespionage and APTs, the need for better security

Hackers will target organizations in an attempt to steal intellectual property, business strategies and other sensitive, mission-critical information. As cybercrime rapidly advances alongside the development of technologies in the business world, it is certain that hackers will target high-value organizations in an attempt to steal intellectual property, business...

Unencrypted, accidental email leads to data breach

Despite corporations investing heavily in data protection, small errors can have big consequences, and a lack of email encryption will certainly lead to data leaks, loss and theft. It's been a long 2015 in regard to data security, but there are still new breaches being discovered and reported in these last two months. Despite corporations investing heavily in data...

Health care: Most valuable data, least investment in data security

Recent reports suggest that health care firms fail to properly invest in strong data security. Cybercrime is no joke, but many organizations still don't take data protection seriously. Unfortunately, recent reports suggest that health care firms are among those businesses and associations that fail to properly invest in strong data security.  According to CNBC - which...

Cloud services and their inherent risk to data security

Cloud security is the biggest hurdle preventing businesses from going all in on these services. Cloud services are now a fundamental component of enterprise IT infrastructure. Between the cost efficiencies, the ease of deployment and the mobility that these solutions offer, it just makes sense in today's corporate world to rely on hosted hardware, databases and...

Your data privacy is on the line

Your data privacy is under more of a threat than ever. In the age of cybercrime, cyberwarfare and cyberespionage, the average consumer might feel as though they are safe from hackers. There are bigger fish to fry, right? Unfortunately, your data privacy is under more of a threat than ever, as everyone from cybercriminals to government agencies and major tech companies...

Data privacy overseas: Germany to investigate U.S. businesses

American organizations should double down on data security with encryption and implement new data protection strategies in light of data privacy movements overseas. The Safe Harbor ruling certainly introduced a wrench into the typical enterprise's data security strategy, as it essentially dissolved a long-standing agreement between the U.S. and EU in regard to data...

US firms and the growing risk of cyberespionage

Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. In an attempt to stamp out cyberespionage, governments are creating agreements dedicated to preventing cybercriminal activity and promoting better cyberawareness on both a...

Data privacy disaster: Safe harbor agreement struck down

The safe harbor agreement is a key component of conducting business overseas, but all that has changed. Data privacy and trans-Atlantic relationships have been protected by the "safe harbor" agreement since 2000. This joint decision made by the European Union and the United States government stated that U.S.-based businesses could send EU citizens' data back to American...

CloudMask provides end-to-end encryption for emails, files and applications. Only those you explicitly trust can decrypt and see your data in clear; Not hackers, Cloud Providers, Government Agencies, or even CloudMask. Twenty-six government cybersecurity agencies around the world back these claims.

TRY IT FREE

Sign Up for our Newsletter to get the latest in everything cyber security. We care about your privacy, let us show you how.

Recent Posts