<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1424789497837018&amp;ev=PageView&amp;noscript=1">

CloudMask Blog

Data privacy disaster: Safe harbor agreement struck down

The safe harbor agreement is a key component of conducting business overseas, but all that has changed. Data privacy and trans-Atlantic relationships have been protected by the "safe harbor" agreement since 2000. This joint decision made by the European Union and the United States government stated that U.S.-based businesses could send EU citizens' data back to American...

A lesson in email security from an unlikely source

Without adequate email protection, some business people could experience personal and business-related disruption. The data breach of Avid Life Media demonstrated how easy it is for cybercriminal groups to steal incriminating information, as hackers successfully breached the company's network and made off with the personal records and account data of millions of...

Personal data protection: What's your data worth?

Your data is valuable. Data security is not just a concern for corporations with millions of shoppers' payment card numbers and valuable intellectual property. As a consumer, you also need to implement data protection solutions if you want your personal emails, private information and sensitive data to stay out of the hands of cybercriminals, the government and data...

Man-In-The-Cloud (MITC) attacks; risk and solution

MITC attcks allow cybercriminals to access data and documents stored in popular file synchronization services such as Google Drive. Cloud storage has slowly but surely become the best method for sharing, backing up and remotely accessing data in all forms, from Word documents to movies to sensitive, personally identifiable information. So, given Google's position in...

Cybersecurity Information Sharing Act back: What this means for businesses

Consumers and organizations should be worried about their cyberprivacy and data security if the CISA bill passes Senate this week. With the U.S. Senate set to go on recess for the remainder of the summer, consumers and Internet users rejoiced, assuming that the judgment over the Cybersecurity Information Sharing Act would be delayed to the fall. This would give...

The Canadian Digital Privacy Act (Bill S-4): What it all means

Bill S-4 or the Digital Privacy Act or An Act to Amend the Personal Information Protection and Electronic Documents Act is the Canadian government's latest attempt to reform PIPEDA, and it was passed into a law as of June 18, 2015. After a tumultuous 2014 and a similar start to 2015, the Canadian government approved changes made to the Personal Information Protection...

Customer confidentiality: 3 ways to take care of clients' data

It is up to lawyers and their employers to protect the confidentiality of their clients, maintain the integrity of data and ensure that information is readily available without compromising security. Technology has always been a double-edged sword, and cloud computing is not an exception to this rule. The use of cloud services and hosted infrastructure has dozens of...

Uncommon Sense: Security that Unleashes Capacity to Use the Cloud with Confidence

  Common sense security says it’s no secret that when we go online, we take the risks of entering a war-zone.  Cyberspace remains a domain of commerce in which rule of law is still emerging.  As it relates to physical property, movement across the seas, or navigating in the skies, the law is well established, defined and enforced. But law and its enforcement in...

CloudMask provides end-to-end encryption for emails, files and applications. Only those you explicitly trust can decrypt and see your data in clear; Not hackers, Cloud Providers, Government Agencies, or even CloudMask. Twenty-six government cybersecurity agencies around the world back these claims.

TRY IT FREE

Sign Up for our Newsletter to get the latest in everything cyber security. We care about your privacy, let us show you how.

Recent Posts