Category Archives: Information Technology

Venom Vulnerability Exposes Cloud Insecurities

By | Cloud Storage, Corporate Compliance, Data Security, Enterprise Collaboration, Facts About the Cloud, Information Technology | No Comments

When you store your data in the cloud, the reality is that it usually lives on a server within a massive data center made up of many servers. Each server generally hosts multiple virtual machines that act as separate environments for individual accounts, allowing the provider to store your data in a way that keeps it segregated from other people’s…

Read More

Key Takeaways from Verizon’s 2015 Data Breach Report

By | Data Security, Enterprise Collaboration, Information Technology | No Comments

The 2015 Verizon Data Breach Investigations Report, published since 2008, was released last month, and it details a thorough investigation of common data security threat patterns, as well as the effects of different kinds of data breaches in various industries. Called “the Data Breach Bible” by Tripwire, the report compiled the data of nearly 80,000 security incidents and more than…

Read More

How Secure Is Apple Pay on the Apple Watch?

By | Data Security, Enterprise Collaboration, Information Technology | No Comments

The Apple Watch is scheduled to ship on April 24th, and with a recent controversy over fraud on Apple’s mobile payment platform, people are asking tough questions about the security of their new smartwatch, especially about how it syncs with Apple Pay. (To learn more about how Apple Pay works – hint: tokenization – read this post.) Much like the…

Read More

Credit Unions Concerned, Unprepared for Insider Threats

By | Corporate Compliance, Data Security, Enterprise Collaboration, Information Technology | No Comments

AT&T just got the bill for its insider data breach, and it’s in the ballpark of a $25 million civil penalty settled in conjunction with the FCC. In 2013 and 2014, employees at call centers in Mexico, Colombia, and the Philippines used proprietary network information to gain unauthorized access to PII (personally identifiable information) for more than 275,000 customers and…

Read More

How and Why to Protect Your PII

By | Corporate Compliance, Data Security, Enterprise Security, Information Technology | No Comments

What is PII? Personally identifiable information, or PII, is a common term in information security and privacy law denoting any information that can be used to identify an individual – alone or in context with other information. PII can be used by hackers and malicious parties to steal or exploit an individual’s identity, and with the high frequency of data…

Read More

A Global Look at Cybersecurity

By | Corporate Compliance, Data Security, Information Technology | No Comments

Last year, McAfee and the Center for Strategic and International Studies published a report on the cost of cybercrime, estimating the annual cost to the global economy to be over $400 billion. The U.S., China, Japan, and Germany account for $200 billion of that. With the State of the Union address and ensuing changes in cybersecurity regulations in the U.S.,…

Read More

Facebook Messenger App Adds Risk to Collaboration

By | Corporate Compliance, Data Security, Information Technology | No Comments

Facebook, the social network that boasts more than a billion worldwide users, recently announced that it will require users to have the separate Facebook Messenger app in order to use its instant messaging and voice-calling service. While the Facebook Messenger app has been around since 2011, the recently-released version features enhanced communications and productivity features for on-the-go users, and the…

Read More

Act like a Regulated Company by Protecting Data Now

By | Data Security, Information Technology | No Comments

Technology often outpaces the legal system in the United States. While legal battles like startup Uber vs. entrenched taxi unions take center stage in the media, there is a less visible – and perhaps more pertinent – struggle taking place around data breach regulations. Regulated industries, such as financial services and healthcare, have long-standing guidelines around the confidentiality of sensitive…

Read More
Sound exciting? Try Arc for free now! Get Started