Video Screencast Help

Information Unleashed

Showing posts tagged with Data Loss Prevention
Showing posts in English
Rich Dandliker | 11 Jul 2012 | 1 comment

In the constant war for information security between businesses and cybercriminals, we are so focused on the faceless, outside enemy that we often fail to recognize potential double agents within our own ranks. With so many resources devoted to preventing hackers and cybercriminals from getting past our external network defenses, it’s easy to neglect internally based intellectual property (IP) theft.

IP theft is staggeringly costly to the global economy: U.S. businesses alone are losing upwards of $250 billion every year. As it turns out, IP thieves are most often either current or former employees.  We trust most of our employees to do the right thing, but the malicious actions of a single person can jeopardize the health of the business and jobs for everyone.  

A research review by Drs. Eric D. Shaw and...

Tim_Matthews | 12 Jun 2012 | 1 comment

 

In a recent court case U.S. v. David Nosal, Judge Alex Kozinski ruled that the Computer Fraud and Abuse Act (CFAA), the nation’s anti-hacking law, applies to people accessing data by circumventing technological access barriers, but it does not extend to employees violating their employer’s restrictions on the use of that information. Under the new interpretation, an employee who has valid credentials to access company data and then misuses that data, however inappropriately, cannot be prosecuted under the CFAA. However, an employee who has valid credentials to access a company computer, but hacks into company data for which he does not have authorization can be prosecuted under CFAA.

The reason for the new interpretation, according to the ruling summary, was that using the CFAA to take action against employees that violate use restrictions could lead...

Tim_Matthews | 15 May 2012 | 0 comments

U.S. companies are paying more to notify people impacted by data breaches, according to the 2011 Cost of a Data Breach Study: United States. The average cost to notify victims of breach increased in this year’s study from approximately $510,000 to $560,000. At the same time, the average size of a breach is down 16 percent and the costs associated with the detection and escalation of data breach events declined as well, suggesting that companies may be more efficient in investigating data breaches.

So, if companies are better at detecting breaches and breaches involve fewer records, why are notification costs continuing to creep up?

The...

Sean Doherty | 01 Mar 2012 | 1 comment

It’s no secret that information is the prize in today’s war between businesses and cybercriminals. And just when organizations had come to terms with the fortress-style protection needed to keep information safe within the corporate walls, technology evolved to include virtualization and cloud. These advances provide increased business flexibility, improved scalability and can create significant cost savings, but they also increase your exposure to outside threats and therefore drive up risk. And, as if to make matters worse your InfoSec team has to figure out how to keep corporate data safe when it is being accessed out of the office on mobile devices, as well as ensuring the security of the virtualized data center which is highly dynamic in nature.

Symantec is teaming up with the leading virtualization provider VMware, to address some of the most pressing security issues affecting businesses globally as they take the step to virtualize more business critical...

fdesouza | 29 Feb 2012 | 0 comments

In his RSA keynote, Symantec CEO Enrique Salem spoke about how the Digital Native is shaping tomorrow's security today. Born into a world of connectivity, Digital Natives are a growing generation that is making a significant impact on businesses by the way they work, think and interact. For this generation, the lines between connectivity in their professional and personal lives is blurred. While this may bring about greater productivity, it can also lead to increased risk. Businesses must embrace this change and get ahead of the potential vulnerabilities.

We're innovating to ensure our customers have the protection they need to embrace the hyper-connected enterprise brought on by the Digital Native. We’ve announced some exciting new solutions that address the challenges of today and those that will emerge in the future:

A new security control point for the cloud

Companies need...

fdesouza | 21 Feb 2012 | 0 comments

 

One of about the things I enjoy most in my role is the opportunity to engage with our customers about the challenges they're facing on a daily basis.  Over the past few months they have raised a number of issues that mirror what we are seeing on a macro level.  While trends like cloud, virtualization and mobility offer great promise, companies around the world are struggling with the new challenges they present. 

And all too often, companies are afraid to take advantage of opportunities in front of them.  The same innovations that offer such promise also create risk and complexity.  

That's why protection is such a powerful thing.  It gives you the confidence to be bold and take calculated risks.  And that confidence is important in a world that is radically changing for companies today.  

To enable our customers to take advantages of the opportunities brought on by things like big data and...

fdesouza | 07 Dec 2011 | 1 comment

In today’s business world, information is as valuable as cash. In fact, industrial espionage costs U.S. businesses more than $250 billion each year. This has organizations scrambling to shore up their defenses against all manner of outside attacks.  At the same time, companies of all sizes may be neglecting one of the most important perpetrators of intellectual property (IP) theft: their employees.

In order to assess this often underrated threat, Symantec asked forensic psychologists Eric D. Shaw and Harley V. Stock to examine various factors leading to insider IP theft. While most research is put into the development of technology-based security measures, their white paper focuses on the behavioral and environmental issues that can lead to theft of corporate data.

Who Is the Typical IP Thief, and What Are They Stealing?...