Monthly Archives: July 2014

Act like a Regulated Company by Protecting Data Now

By | Data Security, Information Technology | No Comments

Technology often outpaces the legal system in the United States. While legal battles like startup Uber vs. entrenched taxi unions take center stage in the media, there is a less visible – and perhaps more pertinent – struggle taking place around data breach regulations. Regulated industries, such as financial services and healthcare, have long-standing guidelines around the confidentiality of sensitive…

Read More

Apple and IBM Partner for Big Business Mobile Security

By | Data Security, Enterprise Collaboration, Information Technology | No Comments

Apple and IBM recently announced a partnership to focus on the enterprise mobility ecosystem. The partnership could be a game changer for large companies, and it’s all about mobile security. While the news bodes well for corporations focused on using Apple products, it may leave small and medium businesses out of the equation. Big data breaches spur big response The…

Read More

Why Retail Data Breaches Hit Credit Unions in the Wallet

By | Corporate Compliance, Data Security | No Comments

It’s a tough time to be a credit union. Massive retail data breaches have exposed millions of customers to fraud. While retail outlets are paid regardless of the outcome, credit unions and banks are often left holding the bag, costing them millions in unrecoverable losses every month. National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger summarized…

Read More

Google Developer Conference Places Mobile Security at Center Stage

By | Data Security, Enterprise Collaboration | No Comments

Google is taking on the challenge of offering a more secure corporate mobile environment. At the recent Google I/O Developer Conference, new features were introduced to spur corporations to use mobile devices for business. Though this built-in mobile device security could alleviate some IT headaches, truly secure enterprise file-sharing and collaboration requires more than mobile device compliance. John Chen, CEO…

Read More

Clear up Cloud Misconceptions with These Tips

By | Facts About the Cloud | No Comments

Cloud storage and collaboration solutions promise more convenient ways to share important business data. With an ever-increasing array of applications and simple, even automatic ways to upload data, the cloud has never been more popular. But does popularity align with security? Check your beliefs against these commonly-held misconceptions about cloud storage and data security. “Files stay in one place, just…

Read More

Study Reveals Policy Workflow Automation Leads Tactics to Boost Compliance

By | Enterprise Collaboration, Information Technology | No Comments

Part 4 of 4 posts discussing the Ponemon Institute’s study on “The State of Data-Centric Security.” Policy workflow automation tools promise greater compliance amongst employees and stakeholders by seamlessly enforcing company rules for data storage and collaboration from behind the scenes, without extra time or effort from the end user. In a recent survey of over 1,500 global IT and…

Read More

Over Half of IT Pros Admit Hidden Data Is Keeping Them up at Night

By | Data Security, Information Technology | No Comments

Part 3 of 4 posts discussing the Ponemon Institute’s study on “The State of Data-Centric Security.” Despite media-popular threats to information security, such as hackers and malicious employees, it turns out the biggest insomnia-inducing threat to Information Technology managers the world over is simple: not knowing where sensitive files live. In a recent study of over 1,500 global IT and…

Read More

Ponemon Report Reveals IT Leadership Knows Corporate Data Is at Risk

By | Corporate Compliance, Information Technology | No Comments

Part 2 of 4 posts discussing the Ponemon Institute’s study on “The State of Data-Centric Security.” It’s never been easier to move data from one place to another. Powerful mobile devices and faster Internet connections have led to the rapid exchange of information. But this convenience comes with consequences for Information Technology managers. In a recent study of over 1,500…

Read More
Sound exciting? Try Arc for free now! Get Started