Posted by Nina Seth on October 31, 2012
Who’s lurking around your valuable data? According to new figures from the Information Commissioner’s Office (ICO) in the U.K., your organization’s risk for a breach has increased by a startling percent.
Here’s the spooktacular data they found:
Posted by Accellion on October 26, 2012
An Osterman Research report recently conducted a survey of 760 individuals addressing the bring-your-own-device, or BYOD, issues facing their organizations and found widespread use of third-party, cloud-based storage and file synchronization offerings that are sometimes used with IT's blessing, but more often not.
Posted by Hormazd Romer on October 23, 2012
Does the name Bradley Manning mean anything to you? If you’re a government organization, the name is synonymous with “colossal data breach” – as Manning spearheaded the biggest leak of classified information in our nation’s history.
Posted by Nina Seth on October 19, 2012
With 144.8 billion emails sent every day and the number projected to rise to 192.2 billion in 2016, according to the Radicati Group, email remains the preferred method of communication in the workplace – going on two decades strong. Yet, most business users aren’t able to send attachments at will, with IT typically capping outbound file size limits at 10MB.
Posted by Accellion on October 8, 2012
Are U.S. public cloud providers European data-centers able to keep your data safe?
Posted by Accellion on October 4, 2012
The high-tech world has no shortage of acronyms. DLP, NAC, TCP, WAN, Wifi– the list goes on and on, making it tough to keep track of the latest buzzwords. Perhaps one of the most widely used acronyms currently is BYOD- the much talked about trend of employees bringing their own devices into the enterprise and the security challenges created as a result.
Well, get ready, because there’s a new acronym that’s entered the fold: BYOC. Bring Your Own Collaboration.
Posted by Hormazd Romer on September 25, 2012
True or false? When you share your information with a public cloud service, you give up “ownership” rights to that data? Well, as some Twitter users can tell you, when an official legal request is involved, that statement is definitely true.
Posted by Accellion on September 13, 2012
As expected, Apple announced the much-anticipated iPhone 5 at this week’s media event to great fanfare and we expect once available it will immediately become part of the BYOD mix.
Posted by Hormazd Romer on August 27, 2012
Do you remember the first document you saved on a thumb drive? It used to be that employees wouldn’t leave the office without one – routinely saving board slides and keynote presentations on these mini storage devices. While still a popular giveaway at tradeshows (how many have you stockpiled over the years?), the idea of having corporate data floating around unprotected is too risky of a proposition for an enterprise of any size.
Posted by Accellion on August 14, 2012
For the Texas Juvenile Justice Department (TJJD), the ability to communicate quickly and securely makes all the difference for the youth they serve. Operating dozens of treatment facilities, correctional institutions and halfway houses throughout the state, TJJD needed a way for its 2,500 employees to share confidential data efficiently and reliably between parents, medical staff and legal counsel.