Posted by Janine Kromhout on May 18, 2011
It was reported from last week’s HIPAA conference, sponsored by OCR and the National Institute of Standards and Technology, that the final rule that will strengthen HIPAA privacy and security safeguards will be released by the end of 2011. Sue McAndrew, deputy director for health information privacy at the Office of Civil Rights in the Health and Human Services Department, went so far as to say:
Posted by Janine Kromhout on May 10, 2011
When you think of Barney, Bob the Builder and Thomas the Tank Engine, enterprise software isn't usually the first thing that comes to mind, but today Accellion announced that the company behind these widely cherished children's entertainment brands, HIT Entertainment, has implemented a virtual, enterprise-wide deployment of Accellion Secure File Transfer.
The press release goes on to detail:
Posted by Janine Kromhout on May 6, 2011
Robert Mullins’ Network World blog entry warning that SharePoint data might be at risk comes as no surprise. Customers have come to us for a way to extend the file sharing functionality of SharePoint securely beyond the firewall for the last few years.
What was most interesting is the research done by Randy Franklin Smith of Ultimate Windows Security. The company’s survey showed that:
Posted by Janine Kromhout on May 3, 2011
Reports from the team who attended GovSec in Washington DC highlighted that there is a lot to be learned from the government sector. Based on recent conversations, it seems to me, government IT organizations are among the most risk averse of all industry sectors. Risk adverse organizations are:
Posted by Nina Seth on April 21, 2011
I recently had an opportunity to watch race car driving live at Infineon Raceway in Sonoma. If you’re a car enthusiast like me, nothing is more exciting than seeing hot sports cars driving fast on a track. Drivers are continually trying to outmaneuver each other to gain position and push their own driving abilities to the limit.
Posted by Paula Skokowski on April 19, 2011
Last weekend marked the 40th anniversary of the introduction of the File Transfer Protocol (FTP). While FTP certainly isn’t pretty to use, it has served a purpose. Originally designed to enable programmers to move files between systems, FTP has continued to serve that purpose nobly for the past 40 years.
However IT departments who have used FTP as the basis for employees to share files across the enterprise, have had less successful results.
Posted by Paula Skokowski on April 15, 2011
If a tree falls in a forest, and no one hears it, does it make a sound? Or the file sharing equivalent – if an employee uses a free personal file sharing account, and IT doesn’t know about it, does it still present a security risk? You bet it does.
Posted by Paula Skokowski on April 12, 2011
The Epsilon data breach of last week keeps on giving, with millions of email notifications being sent out from the companies affected, informing recipients of the incident. The New York Times has weighed in and made recommendations for Congress to address this type of failure for consumers with an editorial “Who Really Sent That E-Mail?”
Posted by Nina Seth on April 7, 2011
We should all thank Corinne Schmid at CMSWire for reminding us of the central role that employees play in Enterprise Collaboration. Far too often articles on collaboration focus on business benefits derived from collaboration, rather than the efficiencies gained by individuals. But the fact remains that if:
Enterprise Collaboration is a journey, it is used to reach a destination by its drivers – Employees.”
Posted by Paula Skokowski on April 5, 2011
10. Your company has already had a data breach. Don’t make the same mistake twice. According to a recent survey by McAfee, only half of the companies who have had a data breach or attempted data breach, have taken steps to remediate and protect systems for the future.