The Commander in Chief promises to “make America great again”. Issues like American jobs and national security are top priorities for U.S President, Donald Trump. As his agenda begins to manifest, Toyota found itself in hot water. The car company was publically criticized by Mr. Trump for its plans to invest in a new plant in Mexico. Their stocks immediately plummeted by...
January 19, 2017
Leave a comment
Google,
Data Masking,
User Privacy,
Government surveillance,
data privacy
By CloudMask Team
Please come by and chat with us at South Hall #2820 - Use discount code XE7CANADA1 for free expo entry – a $175 value CloudMask is a patented SaaS security platform, running on Endpoint, transparently intercepts and analyzes data to identify and mask private information. The intercepted data may belong to...
If businesses are certified in a certain category, they earn the right to flaunt that achievement in hopes of it attracting clients.if businesses are certified in a certain category, they earn the right to flaunt that achievement in hopes of it attracting clients. Since cybercrime is clearly not going away anytime soon, the business world must now deal with data...
November 23, 2016
Leave a comment
Certifcation,
Common Criteria,
User Privacy,
data security
By CloudMask Press
Over the years, Google has emerged as the world’s largest collaboration and business use platform. It has nearly a billion subscribers and a complete application ecosystem that comprises email, file storage, calendar, office applications and business collaboration capabilities. Most of these services can give small and medium businesses capabilities that match those only...
January 27, 2016
Leave a comment
Google,
Data Masking,
User Privacy,
Government surveillance,
Cloud threats,
data privacy
By CloudMask Team
Your data privacy is under more of a threat than ever. In the age of cybercrime, cyberwarfare and cyberespionage, the average consumer might feel as though they are safe from hackers. There are bigger fish to fry, right? Unfortunately, your data privacy is under more of a threat than ever, as everyone from cybercriminals to government agencies and major tech companies...
November 06, 2015
Leave a comment
Personal Data Protection,
Breach,
User Privacy,
Government surveillance,
data privacy,
cloud computing
By Wael Aggan
Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. Cyberspace has no boundaries or borders, and this spells trouble for corporations around the world. In an attempt to stamp out cyberespionage, governments are creating agreements dedicated to preventing cybercriminal activity and promoting better cyberawareness on both a...
October 25, 2015
Leave a comment
Breach,
Cybercrime,
Data Masking,
User Privacy,
Government surveillance,
data privacy,
cyber threats
By Wael Aggan
MITC attcks allow cybercriminals to access data and documents stored in popular file synchronization services such as Google Drive. Cloud storage has slowly but surely become the best method for sharing, backing up and remotely accessing data in all forms, from Word documents to movies to sensitive, personally identifiable information. So, given Google's position in...
Consumers and organizations should be worried about their cyberprivacy and data security if the CISA bill passes Senate this week. With the U.S. Senate set to go on recess for the remainder of the summer, consumers and Internet users rejoiced, assuming that the judgment over the Cybersecurity Information Sharing Act would be delayed to the fall. This would give...
Bill S-4 or the Digital Privacy Act or An Act to Amend the Personal Information Protection and Electronic Documents Act is the Canadian government's latest attempt to reform PIPEDA, and it was passed into a law as of June 18, 2015. After a tumultuous 2014 and a similar start to 2015, the Canadian government approved changes made to the Personal Information Protection...
July 11, 2015
Leave a comment
Personal Data Protection,
Compliance,
User Privacy,
data privacy
By Wael Aggan
This is the third part of 5 parts discussion where I will present the main risks of Cloud Computing and how CloudMask addresses those risks. I hope to receive your comments. W.A. Governments around the world have Digital Surveillance Programs that can be used to demand legal access to your data stored with a Cloud Service Provider (CSP) or Telecommunication companies....