<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

A lesson in email security from an unlikely source

Without adequate email protection, some business people could experience personal and business-related disruption. The data breach of Avid Life Media demonstrated how easy it is for cybercriminal groups to steal incriminating information, as hackers successfully breached the company's network and made off with the personal records and account data of millions of...

Personal data protection: What's your data worth?

Your data is valuable. Data security is not just a concern for corporations with millions of shoppers' payment card numbers and valuable intellectual property. As a consumer, you also need to implement data protection solutions if you want your personal emails, private information and sensitive data to stay out of the hands of cybercriminals, the government and data...

PCI compliance in the cloud: The responsibility of data security

Any organization that deals with payment card data must comply with the Payment Card Industry's Data Security Standards. Cloud computing provides organizations with a way to reinvent their IT systems, replacing legacy hardware with services that scale according to business needs. Nowadays, the cloud acts as a differentiator between the best and the worst businesses, but...

Man-In-The-Cloud (MITC) attacks; risk and solution

MITC attcks allow cybercriminals to access data and documents stored in popular file synchronization services such as Google Drive. Cloud storage has slowly but surely become the best method for sharing, backing up and remotely accessing data in all forms, from Word documents to movies to sensitive, personally identifiable information. So, given Google's position in...

Cybersecurity Information Sharing Act back: What this means for businesses

Consumers and organizations should be worried about their cyberprivacy and data security if the CISA bill passes Senate this week. With the U.S. Senate set to go on recess for the remainder of the summer, consumers and Internet users rejoiced, assuming that the judgment over the Cybersecurity Information Sharing Act would be delayed to the fall. This would give...

Snapshot: The organized state of cybercrime

Organized cybercrime is a major problem for today's businesses. Given the sophisticated nature of modern attack vectors and the value of personal data, it should come as no surprise that criminal organizations have formed with the intent of inspiring political change, committing corporate espionage and instilling their views on digital privacy on the world. In fact,...

Incident Response Planning (IRP): 3 questions you should ask

If IRPs are mandatory to prepare for post-breach circumstances, organizations need to ask themselves these three questions. Data breach madness has reached a peak, as organizations slowly but surely discover one by one how no one is safe in today's cyberclimate. And experts universally agree that intrusions are inevitable, since attack vectors keep appearing in the form...

Today's approach to shadow IT: Make it a non issue

Thanks to modern technologies, shadow IT in full swing and IT departments are struggling to shine light on unauthorized cloud app usage. From malware to phishing, enterprise IT often turns to interesting terminology to identify and label cybersecurity threats. Shadow IT is no exception to this rule, as the phrase describes the unauthorized use of software, hardware...

The Canadian Digital Privacy Act (Bill S-4): What it all means

Bill S-4 or the Digital Privacy Act or An Act to Amend the Personal Information Protection and Electronic Documents Act is the Canadian government's latest attempt to reform PIPEDA, and it was passed into a law as of June 18, 2015. After a tumultuous 2014 and a similar start to 2015, the Canadian government approved changes made to the Personal Information Protection...

How Cloud Computing is introducing new risks, and how Companies can protect themselves better

Many people feel that Cloud computing has been around for quite a long time, and intrusion into such technology is far from innovative. To them, it appears that instead of storing data on their own servers in a server farm, they now store their data in much larger clusters of servers in someone’s data center. The Cloud's threats arise from the sheer scale of data that...

CloudMask provides end-to-end encryption for emails, files and applications. Only those you explicitly trust can decrypt and see your data in clear; Not hackers, Cloud Providers, Government Agencies, or even CloudMask. Twenty-six government cybersecurity agencies around the world back these claims.

TRY IT FREE

Sign Up for our Newsletter to get the latest in everything cyber security. We care about your privacy, let us show you how.

Recent Posts