<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Anatomy of Password-based Data protection – Part Two

Data Masking as a Solution to Password Weaknesses Password-based data protection is the most common form of data protection, but it is increasingly weak. If you think your data is secure because your organization insists on strong passwords, you are increasingly likely to be wrong. Better software tools running on powerful processors can try millions of character...

Anatomy of Password-based Data protection – Part one

What Is Wrong With Passwords-based data protection? Today, Password-based data protection is the foundation of 99% of data protection. It’s ubiquitous: you want access to an account or information, so you type your username and password, and you can get in. For critical and restricted information, you might have to do it again, with a different password. Your company’s...

How to protect your Gmail and Drive from surveillance, Google & when your login is compromised?

Over the years, Google has emerged as the world’s largest collaboration and business use platform. It has nearly a billion subscribers and a complete application ecosystem that comprises email, file storage, calendar, office applications and business collaboration capabilities. Most of these services can give small and medium businesses capabilities that match those...

Your Liability for 3rd Party Data Breaches

The discussion of data breach liability is complex. In the Wired article “The Crooked Path to Determining Liability in Data Breach Cases “ highlights the complexity of this issue. Hackers target the weakest link along the chain of entities that protect customer data. Because the harm from data breaches falls to each party not just the party that failed to implement...

Living the Age of Hackers Anxiety

Many consumers and business are anxious about the security of their information, both on their own devices and on business networks. While they worry about being hacked, they continue to engage in risky activities. According to a recent survey published by Arbor Networks, 75% of adults say they are concerned about their security, privacy, malware and websites tracking...

Think Security Best Practices Can Keep Your Data Safe? Think Again

The application of best practices to a business process can give you the results you want. For example, quality assurance best practices result in the specified level of product quality and best practices in manufacturing reduce the number of product defects. Applied to data security, best practices can keep the data on your computer and mobile devices safe as long as it...

Meet Your Legal Obligations – Part 2 Protecting Client Confidentiality

Part I of this series, “A shifting Legal Landscape” looked at the changing business environment and the need for secure data access. It then discussed the threats to client confidentiality that accompany such technological changes. Part II, “Protecting Client Confidentiality to Meet Ethical Obligations,” suggests a way you can protect yourself against these threats and...

Meet Your Legal Obligations - Part 1: A Shifting Legal Landscape

This two-part series explores how information security enables and helps expand your practice by utilizing available cloud resources. Part one explores the changing business environment and the need to collaborate in a simpler, controlled and secure way. Part two discusses the technology changes, the risks of using technology and how to mitigate these risks. A Shifting...

Data security: Forecast for 2020

Businesses and associations need to take a broader look at cybersecurity, ensuring that the tools they deploy now are still viable solutions in 2020. Cybersecurity is now an issue on everyone's radar, from businesses to governments to consumers. This is great news, as the world has finally realized just how vulnerable their personal and corporate data really is -...

Is data security more important to consumers than physical well-being?

Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. Personal data protection has quickly risen to the top of consumers' priority lists, as people around the world continue to witness or experience data breaches of increasing magnitude. ...