<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

How to evaluate and select the best encryption services

Encryption is necessary after all, so the only discussions about this technology and these services should be about choosing a solution. When to comes to truly protecting data, encryption is a no-brainer. In fact, some industry regulations require that businesses and associations encrypt specific information. Health care is a great example of this, but organizations in...

Turn regulatory headaches into a competitive advantage

Data security and privacy compliance and competitiveness are one in the same for law firms. For better or worse, whether lawyers love it or hate it, technology is now a fundamental aspect of the legal sector. While the reliance on IT isn't new in law by any means, modern technologies such as cloud computing, mobile devices, and software-as-a-service solutions now play...

Court Rulings Limit Privacy Protections From Data Residency

Jurisdictions around the world, including the European Union and Canada, are enacting laws and creating regulations forcing companies that collect personally identifiable information (PII) to store the data of their residents within their national boundaries. This concept is known as data residency and the idea is that local privacy laws will apply to data stored...

I have “nothing to hide”! Why should I care about Government surveillance?

If you don't have anything to hide, then why would you object if the police come to your home to search and take pictures of your documents without your permission? Unfortunately for you as a consumer, the discussion regarding data protection is often focused on corporations and what they can do to prevent hackers from accessing mission-critical communications and...

How can we use the cloud and comply with global privacy laws?

The cloud clearly provides a number of benefits for businesses and associations, but as many are aware, remaining compliant with regional, federal and industry law and regulations is a major challenge. For decades, organizations have kept control over their data and customers' information as it was simply stored in on-premise data centers. Now, cloud services are the de...

Is data manipulation the next step in cybercrime?

Data manipulation could mean disaster for corporations, health care providers, national security agencies and individuals around the world. Businesses and consumers both invest time and money into securing private information, but too often, the focus is on preventing hackers from accessing data and therefore ensuring that sensitive information, trade secrets and...

Maintaining Law Firm Client Confidentiality with Cloud Masking

If you work in the law profession or are an IT professional responsible for law firm records, you know to what extent your business depends on the ability to keep sensitive client information confidential. The issues raised by storing law firm client data digitally are data security, data accessibility and the maintaining of legal privilege. When you store client...

How Cybersecurity Affects Legal Ethics Compliance

Effective cybersecurity is essential for law firm operations, for regulatory compliance and for keeping a good reputation, but it requires a familiarity with the principles of secure IT. Legal ethics require that lawyers keep private information secure and preserve client records. As a member of the legal profession, you have to ask how service providers deal with...

Your data privacy is on the line

Your data privacy is under more of a threat than ever. In the age of cybercrime, cyberwarfare and cyberespionage, the average consumer might feel as though they are safe from hackers. There are bigger fish to fry, right? Unfortunately, your data privacy is under more of a threat than ever, as everyone from cybercriminals to government agencies and major tech companies...

Data privacy overseas: Germany to investigate U.S. businesses

American organizations should double down on data security with encryption and implement new data protection strategies in light of data privacy movements overseas. The Safe Harbor ruling certainly introduced a wrench into the typical enterprise's data security strategy, as it essentially dissolved a long-standing agreement between the U.S. and EU in regard to data...