Blog

You Really Need Persistent Data Protection

You Really Need Persistent Data ProtectionDespite significant security investments made by organizations, data breaches of sensitive information continue at an alarming rate. There are many contributing factors to this situation such as the ever increasing rate of data collection as well as cloud computing, outdated security standards and controls, and flawed applications with security vulnerabilities.

Today’s bad guys are well funded, skilled and organized. When they set their sights on something like personal health information (PHI) or intellectual property (IP), they are quite effective at getting at the crown jewels.

For so long, organizations have spent their money, resources and time on traditional approaches like network, device and application security. While these fundamental security measures are still necessary, relying on them solely isn’t enough today.

Read the rest of this entry »

Fasoo Presents to Ponemon RIM Council

Fasoo Presents to Ponemon RIM CouncilBill Blake, President of Fasoo, Inc., joined Dr. Larry Ponemon in a presentation on July 20, 2016 to the Ponemon RIM Council of the findings from the recent Ponemon Institute survey “Risky Business: How Company Insiders Put High Value Information at Risk”.  Bill and Larry discussed numerous points highlighted in the survey including how to deal with careless acts by employees and contractors that can ultimately result in a data breach.

The Ponemon RIM (Responsible Information Management) Council is a select group of privacy, security and information management leaders from multinational corporations who are champions within their various industries on issues involving privacy and data protection.  Many of the members were very interested in the conversation about company insiders, since many security organizations focus more of their technology and human resource on fighting external threats to sensitive information.

Read the rest of this entry »

EU-US Privacy Shield and the Future of Data Protection

EU-US Privacy Shield and the Future of Data ProtectionThe European Commission adopted the EU-US Privacy Shield on July 12, 2016 as a replacement for the Safe Harbor rules that were overturned by the European Court of Justice in October 2015.  This new framework protects the fundamental rights of anyone in the EU whose personal data is transferred to the United States as well as bringing legal clarity for businesses relying on transatlantic data transfers.

The new EU-US Privacy Shield is an example of stronger privacy and security frameworks that affect US and European businesses as they collect, manage and share personal data.  Ensuring the security of personal information, no matter its location, is no longer a technology issue.  This is a business and trade issue.  If I am a US company and want to do business online or in person with businesses and citizens of the EU, I must guarantee that sensitive personal data is always under my control and that only authorized people can access it.

Read the rest of this entry »

Brexit May Cause Inadvertent Data Breaches

Brexit May Cause Inadvertent Data BreachesWith the British decision to leave the European Union, there may be a trend of corporate headquarters leaving the UK to remain under the EU.  This may trigger inadvertent data breaches as those organizations choosing to move could see an increase in employee exits that may bring security and privacy implications.  I have read recent reports of increases in visa applications and emigration requests as many people are seriously thinking of going to Canada, Australia and other countries as a result of the potential consequences of the vote.

Employees, no matter their position within the organization, have access to sensitive systems and files.  If you are in customer service or sales, you have access to customer information and sensitive information on your products or services.  If you are in HR or Finance, you probably have access to personal information on your employees, business partners and customers.

Anytime an employee leaves an organization, there should be certain security protocols in place to ensure all access to sensitive systems has been removed and that confidential documents are not available and copied for future use.  According to the recent Ponemon survey “Risky Business: How Company Insiders Put High Value Information at Risk“, 47 percent of respondents say recently hired employees bring confidential documents from former employers that are a competitor.  This is a little disturbing, since taking confidential documents from one employer to another can be a violation of privacy and data breach laws, not to mention ruining a company’s brand and business.

Read the rest of this entry »

Fasoo Monthly Newsletter – July 2016

Fasoo July 2016 Newsletter
Learn how companies are using data-centric security strategies to protect high value information from insider and cyber threats
Read the rest of this entry »

197 State Route 18 South, Suite 203N

East Brunswick, NJ 08816

Phone: (732) 955-2333 | inquiry@fasoo.com

© 2016 Fasoo, Inc. All rights reserved.