<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Cybersecurity Implementation for Health Care Records

Sensitive patient records held by healthcare organizations have to be stored and processed securely, both to guard the patients’ privacy and to comply with government regulations. As a healthcare provider responsible for patient information, you have to be able to detail what measures you are taking to safeguard patient data and you have to show that these measures are...

Mitigating the Risk of Data Breaches with Data Masking

Mitigating the Risk of Data Breaches with Tokenization When handling sensitive data such as financial records or personal health information, companies must reduce the risk of data breaches to a minimum by addressing possible sources of risk. Without a comprehensive strategy for reducing data breach risks and mitigating their effect, companies risk damaging their...

Tokenization, Encryption and Data Sovereignty...

Tokenization is the process of replacing a sensitive data element with a random equivalent, referred to as a token that has no extrinsic or exploitable meaning. The token is a reference that maps back to the original sensitive data through a tokenization system. Both original sensitive data and token are stored encrypted in a secure database. Reversing this process by...

Part 1: What are Cloud Risks and how to manage them?

This is the first part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. Businesses are often worried about security and control over their data as they plan a move to the Cloud. This worry is often justified because some risks have proven to be real. CloudMask helps you...

Modern cyberespionage and APTs, the need for better security

Hackers will target organizations in an attempt to steal intellectual property, business strategies and other sensitive, mission-critical information. As cybercrime rapidly advances alongside the development of technologies in the business world, it is certain that hackers will target high-value organizations in an attempt to steal intellectual property, business...

Health care: Most valuable data, least investment in data security

Recent reports suggest that health care firms fail to properly invest in strong data security. Cybercrime is no joke, but many organizations still don't take data protection seriously. Unfortunately, recent reports suggest that health care firms are among those businesses and associations that fail to properly invest in strong data security. According to CNBC - which...

Cloud services and their inherent risk to data security

Cloud security is the biggest hurdle preventing businesses from going all in on these services. Cloud services are now a fundamental component of enterprise IT infrastructure. Between the cost efficiencies, the ease of deployment and the mobility that these solutions offer, it just makes sense in today's corporate world to rely on hosted hardware, databases and...

US firms and the growing risk of cyberespionage

Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. In an attempt to stamp out cyberespionage, governments are creating agreements dedicated to preventing cybercriminal activity and promoting better cyberawareness on both a...

Personal data protection: What's your data worth?

Your data is valuable. Data security is not just a concern for corporations with millions of shoppers' payment card numbers and valuable intellectual property. As a consumer, you also need to implement data protection solutions if you want your personal emails, private information and sensitive data to stay out of the hands of cybercriminals, the government and data...

Snapshot: The organized state of cybercrime

Organized cybercrime is a major problem for today's businesses. Given the sophisticated nature of modern attack vectors and the value of personal data, it should come as no surprise that criminal organizations have formed with the intent of inspiring political change, committing corporate espionage and instilling their views on digital privacy on the world. In fact,...