Monthly Archives: June 2014

Study Highlights Key Security Issues for the C-Suite

By | Data Security, Information Technology | No Comments

Part 1 of 4 posts discussing the Ponemon Institute’s study on “The State of Data-Centric Security.” In a recent study of over 1,500 global Information Technology (IT) and IT security practitioners, the Ponemon Institute provided a comprehensive view on the state of data security. This inside-out view of IT should be considered extremely valuable to executives looking to understand the…

Read More

This Heralds the Coming Security Storm in Banking

By | Corporate Compliance, Data Security | No Comments

Between FINRA, FDIC, and SEC regulations, financial services companies have never been under more regulatory scrutiny than they are today, but recent events indicate that there’s an imminent storm around data storage and collaboration in banking. Banking Lags the Market for Data Breaches While major retailers have made top headlines in 2014 for massive data breaches, banks have been left…

Read More

Credit Unions Help Customers Avoid Data Theft with This Simple List

By | Data Security, How to | No Comments

Credit unions have more and more to worry about in the age of mobile banking, web-based financial transactions, and increasingly sophisticated data breaches. Keeping ahead of the latest security nightmares can be a challenge, but banks that proactively educate customers will see fewer issues. Share our list of security topics for bank customers to boost awareness and reduce data loss….

Read More

Assess Your File Float Factor and Address a Growing Security Threat

By | Corporate Compliance, Facts About the Cloud | No Comments

The next big thing in technology has left many corporations exposed. Understanding the extent of the issue is the first step to discovering how many “loose” files are floating in the cloud. Apple and Google have quietly been making a play at your employees’ personal files. Dropbox has also been in the mix, with hundreds of millions of users storing…

Read More

Prevent Employees from Walking out with Data Using This Simple Solution

By | Data Security, Information Technology | No Comments

With the rise of cloud-based storage/collaboration solutions and the growing popularity of Bring Your Own Device (BYOD) policies, ex-employees are almost certainly walking out of your offices with sensitive corporate data. Those in charge of safeguarding corporate assets – CEOs and CTOs – should be concerned. Corporate contacts are almost certainly out the door Bad news for companies concerned about…

Read More

Tips for Implementing a Bring Your Own Device Policy

By | Corporate Compliance, Data Security | No Comments

Bring Your Own Device (BYOD) policies are all the rage in today’s corporate environment because employees work faster and make fewer mistakes on devices they understand. These policies play to simple human nature: the path of least resistance is perceived to be the most efficient. But BYOD policies present myriad challenges for managers who are working towards best practices around…

Read More

What Every Security-Conscious Leader Should Know about Apple’s Big Update

By | Corporate Compliance, Data Security, Enterprise Security | No Comments

Apple is continuing to cement a legacy of innovation in mobile devices. At the June 2 World Wide Developer’s Conference, major new features and enhancements to existing features were announced, but for the risk-conscious executive, updates to Apple’s iOS mobile operating system present new challenges to organizational security. Vigilant CEOs and CTOs should be aware of the new risks these…

Read More

5 Steps to Manage Collaboration While Maintaining HIPAA Compliance

By | Corporate Compliance, Data Security | No Comments

While it offers a comprehensive and lengthy look at compliance, the National Institute of Standards and Technology (NIST) HIPAA Security Rule Guide does not take into account the explosion in usage of cloud-based collaboration services seen in past years. Here are our top technical safeguard considerations for organizations that want greater collaboration around electronic protected health information (ePHI) while maintaining…

Read More
Sound exciting? Try Arc for free now! Get Started