4 Easy Security Tips to Keep Data Protected
Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...
View ArticleStill Doing Fine on Cloud Nine
Businesses that store data in the cloud have an extra set of rules and regulations to deal with. Understand how to address business content collaboration. The post Still Doing Fine on Cloud Nine...
View ArticlePrivacy Shield 101: U.S. Companies Face New Rules
If you’re a U.S. company doing business in Europe, what does the Privacy Shield mean for you? Here are the key points. The post Privacy Shield 101: U.S. Companies Face New Rules appeared first on...
View ArticleThe Trojan Horse Effect: How We Found Highly Sensitive Business Documents in...
For the third year in a row, we uncovered sensitive files stored on consumer file sharing services in our routine Google AdWords campaign. The post The Trojan Horse Effect: How We Found Highly...
View ArticlePrivacy Shield 101: What Does the Future Look Like?
The Privacy Shield has many moving parts. While the situation is still somewhat volatile, here's what the future of data privacy regulations might look like. The post Privacy Shield 101: What Does the...
View ArticleWhat Happens to Data Transfers if the UK Leaves the EU?
With the EU referendum campaigns in full swing, we need to discuss the implications of a leave vote on data transfers, and what it would mean for companies. The post What Happens to Data Transfers if...
View ArticleSafeguarding Client Data and Avoiding the Fines
Given the regulatory environment and increase in cyber-attacks, more institutions are taking proactive steps to boost their cybersecurity programs. The post Safeguarding Client Data and Avoiding the...
View ArticleSo, You Think HR Isn’t Responsible for Information Security?
The Human Resource department should be at the center of any strategic corporate decision. Making sure that information stays safe and secure is paramount. The post So, You Think HR Isn’t Responsible...
View ArticleHR at the Epicenter of the Company’s “Juicy” Details…
Each HR professional must not only protect highly sensitive information but also use it on a day-to-day basis to get their jobs done. The post HR at the Epicenter of the Company’s “Juicy” Details…...
View ArticleHow is HR Supposed to Protect Confidential Data?
The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...
View ArticlePracticing Law Securely — Living with Links
Bob Blacksberg discusses the fundamental security features a secure shared location, a “Secure Repository", should have when sharing messages with links. The post Practicing Law Securely — Living with...
View ArticleA Secure Way to Achieve Organizational Changes
Without a secure solution to facilitate the change process, organizations may put themselves at risk of information leakage during external collaboration. The post A Secure Way to Achieve...
View ArticlePracticing Law Securely — Working with the Shared Repository
Bob Blacksberg shares scenarios for working with the Shared Repository, including how it should be coordinated with an internal Document Management System. The post Practicing Law Securely — Working...
View ArticleHow U.S. Law Firms Should Securely Protect Client Confidential Content
Organizations and their law firms should work to securely protect and control sensitive information at every stage of the content lifecycle. The post How U.S. Law Firms Should Securely Protect Client...
View ArticleSingle Point of Failure
If the security of your data rests on the back of one encryption key or access point, then control of that key or access point will control your data. The post Single Point of Failure appeared first on...
View ArticleSecuring Sensitive HR Information in the Enterprise
Having a secure solution to manage and protect sensitive HR data is critical to reducing the risk associated with the exchange of confidential information. The post Securing Sensitive HR Information in...
View ArticleUsers of File Sharing Apps Continue to Expose Valuable Private Data,...
About a year ago Intralinks revealed that it had uncovered a security issue with many consumer file sync and share applications. Issues continue to persist. The post Users of File Sharing Apps Continue...
View ArticleInformation Security ‘Unquestionables’
There are several questions that today’s enterprises should consider when evaluating a cloud service provider’s customer managed encryption keys solution. The post Information Security...
View ArticleFour Essential Features of Customer Managed Keys to Encrypt Cloud Data
When considering a customer managed encryption keys solution, here are four essential capabilities you should consider. The post Four Essential Features of Customer Managed Keys to Encrypt Cloud Data...
View ArticleThe Data Sovereignty Dilemma of the Digital Workplace
If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...
View ArticleEurope’s Forthcoming General Data Protection Regulation
Organizations that do business involving European data may need to consider a compliance strategy around data protection regulations. The post Europe’s Forthcoming General Data Protection Regulation...
View ArticleGetting Started with a Customer Managed Encryption Keys Solution
Here are four essential capabilities your customer managed encryption keys solution should have along with a general setup process for getting started. The post Getting Started with a Customer Managed...
View ArticleHow can Businesses Evade the Ever Increasing Threat to their Data Security?
Intralinks' CTO EMEA, Richard Anstey, shares the state of corporate information security and best practices for data protection on Information Security Buzz. The post How can Businesses Evade the Ever...
View ArticleThe Challenges of Data Sovereignty in the Cloud
The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...
View ArticleSecure Marketing Collaboration: Digital Assets
In today’s global operations, digital marketing teams are constantly creating and collaborating on large media files. Here's how teams can share securely. The post Secure Marketing Collaboration:...
View ArticleEvery CISO’s Mission: Keeping Corporate Data Secure
The mission of the chief information security officer and the corporate security team is to protect the company’s critical assets from risk of a breach. The post Every CISO’s Mission: Keeping Corporate...
View ArticleISO 27001 Requirement for Providers: What You Need To Know
Here’s everything you need to know about what ISO 27001 security certification means to your organization and where its data is stored. The post ISO 27001 Requirement for Providers: What You Need To...
View Article6 Practical Ways to Prepare for Your Next Compliance Exam
Regulatory exams are becoming more complex while preparation time is shrinking. So what's the best way to prepare thoroughly? Here are six practical tips. The post 6 Practical Ways to Prepare for Your...
View ArticleFrom Paper to Digital: How to Keep Data Secure
Lawyers love paper — where would they be without the legal pad? But times are changing and the move from paper to digital is happening in every industry. The post From Paper to Digital: How to Keep...
View Article5 Ways to Sleep Easy Knowing You Can Trust Your Company Data in the Cloud
Here are five data security tips to consider to help your information security and IT teams count sheep and sleep easy with your company data in the cloud. The post 5 Ways to Sleep Easy Knowing You Can...
View ArticleDropbox, Box vulnerable to Man-In-The-Cloud Attack
At last week’s annual Black Hat conference, the security firm Imperva said they’d found a 'side door' vulnerability in several file sync and share apps. The post Dropbox, Box vulnerable to...
View ArticleKeeping Research and Development Secure
With proper security measures, research and development (R&D) departments can rest assured they are protecting their IP through secure collaboration. The post Keeping Research and Development...
View ArticleIndustry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...
Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...
View ArticleU.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...
U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....
View ArticlePracticing Law Securely — Working with Information Rights Management
Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...
View ArticleGeneral Data Protection Regulation: Protecting Both the Customers and the...
With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...
View ArticleSaying ‘No’ to Consumer File Sync and Share Tools for Business
The tools you want to use versus the tools your company provides. Here are the risks of using consumer file sync and share tools for sharing business data. The post Saying ‘No’ to Consumer File Sync...
View ArticleWhat are the True Business Costs of a Data Leak?
There's no easy way to put a simple price tag on the cost of a data leak. Let's look at the types of business costs that might apply, depending on the leak. The post What are the True Business Costs of...
View ArticleIt’s Just Crazy to Trust Your Sensitive Files to Technology That’s 40 years Old
Considering that a smart phone purchased just two years ago is nearly obsolete, imagine using computer protocols that are 30 to 40 years old for business? The post It’s Just Crazy to Trust Your...
View ArticleMitigating Risk in Your Vendor Network
A group of hackers were recently charged with stealing not-yet-public corporate news releases that covered earnings reports, personnel changes and other material information, then traded on it to the...
View ArticleCyber Insurance Is Good to Have but It Won’t Protect a Company (or a CISO)
Cyber insurance is good to have, but it won't protect a company against a breach. Insurance should be viewed as one aspect of a more comprehensive strategy. The post Cyber Insurance Is Good to Have but...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleThe CSO Dilemma: We Have Found the Enemy, and He is Us
We all make mistakes. Miscellaneous/human error, while not harboring bad intentions, is still a major problem for organizations as it may cause data leaks. The post The CSO Dilemma: We Have Found the...
View ArticleAudit Management: How to Save Time, Money, and Be More Secure
Audits are inevitable and finance departments must manage this process efficiently. Here's how a secure enterprise collaboration solution can help. The post Audit Management: How to Save Time, Money,...
View ArticleHow Do You Solve a Data Privacy Problem Like the U.S.?
Research revealed that of 20 industrialized economies, the U.S. was deemed the least trustworthy for accessing information without permission. The post How Do You Solve a Data Privacy Problem Like the...
View ArticlePracticing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleMistakes: Unfortunate. Unforeseen. Unforgivable.
With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....
View ArticleCollaboration Under New General Data Protection Regulations in the European...
The General Data Protection Regulation will impact businesses that operate or collaborate in Europe. How will businesses have to update policy? The post Collaboration Under New General Data Protection...
View ArticlePrivacy Rules Include Your Cloud Provider — Make Sure They’re Compliant
Risk and compliance challenges no longer stop at organizational boundaries. Some government rules mandate that risk management policies cover cloud vendors. The post Privacy Rules Include Your Cloud...
View Article
More Pages to Explore .....