Quantcast
Channel: Data Protection – Intralinks Blog
Browsing latest articles
Browse All 50 View Live

4 Easy Security Tips to Keep Data Protected

Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...

View Article



Still Doing Fine on Cloud Nine

Businesses that store data in the cloud have an extra set of rules and regulations to deal with. Understand how to address business content collaboration. The post Still Doing Fine on Cloud Nine...

View Article

Privacy Shield 101: U.S. Companies Face New Rules

If you’re a U.S. company doing business in Europe, what does the Privacy Shield mean for you? Here are the key points. The post Privacy Shield 101: U.S. Companies Face New Rules appeared first on...

View Article

The Trojan Horse Effect: How We Found Highly Sensitive Business Documents in...

For the third year in a row, we uncovered sensitive files stored on consumer file sharing services in our routine Google AdWords campaign. The post The Trojan Horse Effect: How We Found Highly...

View Article

Privacy Shield 101: What Does the Future Look Like?

The Privacy Shield has many moving parts. While the situation is still somewhat volatile, here's what the future of data privacy regulations might look like. The post Privacy Shield 101: What Does the...

View Article


What Happens to Data Transfers if the UK Leaves the EU?

With the EU referendum campaigns in full swing, we need to discuss the implications of a leave vote on data transfers, and what it would mean for companies. The post What Happens to Data Transfers if...

View Article

Safeguarding Client Data and Avoiding the Fines

Given the regulatory environment and increase in cyber-attacks, more institutions are taking proactive steps to boost their cybersecurity programs. The post Safeguarding Client Data and Avoiding the...

View Article

So, You Think HR Isn’t Responsible for Information Security?

The Human Resource department should be at the center of any strategic corporate decision. Making sure that information stays safe and secure is paramount. The post So, You Think HR Isn’t Responsible...

View Article


HR at the Epicenter of the Company’s “Juicy” Details…

Each HR professional must not only protect highly sensitive information but also use it on a day-to-day basis to get their jobs done. The post HR at the Epicenter of the Company’s “Juicy” Details…...

View Article


How is HR Supposed to Protect Confidential Data?

The Intralinks HR Security Series is a monthly blog series authored by Michal Kimeldorfer, Executive Vice President of Human Resources at Intralinks, created to inform HR professionals about the...

View Article

Practicing Law Securely — Living with Links

Bob Blacksberg discusses the fundamental security features a secure shared location, a “Secure Repository", should have when sharing messages with links. The post Practicing Law Securely — Living with...

View Article

A Secure Way to Achieve Organizational Changes

Without a secure solution to facilitate the change process, organizations may put themselves at risk of information leakage during external collaboration. The post A Secure Way to Achieve...

View Article

Practicing Law Securely — Working with the Shared Repository

Bob Blacksberg shares scenarios for working with the Shared Repository, including how it should be coordinated with an internal Document Management System. The post Practicing Law Securely — Working...

View Article


How U.S. Law Firms Should Securely Protect Client Confidential Content

Organizations and their law firms should work to securely protect and control sensitive information at every stage of the content lifecycle. The post How U.S. Law Firms Should Securely Protect Client...

View Article

Single Point of Failure

If the security of your data rests on the back of one encryption key or access point, then control of that key or access point will control your data. The post Single Point of Failure appeared first on...

View Article


Securing Sensitive HR Information in the Enterprise

Having a secure solution to manage and protect sensitive HR data is critical to reducing the risk associated with the exchange of confidential information. The post Securing Sensitive HR Information in...

View Article

Users of File Sharing Apps Continue to Expose Valuable Private Data,...

About a year ago Intralinks revealed that it had uncovered a security issue with many consumer file sync and share applications. Issues continue to persist. The post Users of File Sharing Apps Continue...

View Article


Information Security ‘Unquestionables’

There are several questions that today’s enterprises should consider when evaluating a cloud service provider’s customer managed encryption keys solution. The post Information Security...

View Article

Four Essential Features of Customer Managed Keys to Encrypt Cloud Data

When considering a customer managed encryption keys solution, here are four essential capabilities you should consider. The post Four Essential Features of Customer Managed Keys to Encrypt Cloud Data...

View Article

The Data Sovereignty Dilemma of the Digital Workplace

If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...

View Article

Europe’s Forthcoming General Data Protection Regulation

Organizations that do business involving European data may need to consider a compliance strategy around data protection regulations. The post Europe’s Forthcoming General Data Protection Regulation...

View Article


Getting Started with a Customer Managed Encryption Keys Solution

Here are four essential capabilities your customer managed encryption keys solution should have along with a general setup process for getting started. The post Getting Started with a Customer Managed...

View Article


How can Businesses Evade the Ever Increasing Threat to their Data Security?

Intralinks' CTO EMEA, Richard Anstey, shares the state of corporate information security and best practices for data protection on Information Security Buzz. The post How can Businesses Evade the Ever...

View Article

The Challenges of Data Sovereignty in the Cloud

The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...

View Article

Secure Marketing Collaboration: Digital Assets

In today’s global operations, digital marketing teams are constantly creating and collaborating on large media files. Here's how teams can share securely. The post Secure Marketing Collaboration:...

View Article


Every CISO’s Mission: Keeping Corporate Data Secure

The mission of the chief information security officer and the corporate security team is to protect the company’s critical assets from risk of a breach. The post Every CISO’s Mission: Keeping Corporate...

View Article

ISO 27001 Requirement for Providers: What You Need To Know

Here’s everything you need to know about what ISO 27001 security certification means to your organization and where its data is stored. The post ISO 27001 Requirement for Providers: What You Need To...

View Article

6 Practical Ways to Prepare for Your Next Compliance Exam

Regulatory exams are becoming more complex while preparation time is shrinking. So what's the best way to prepare thoroughly? Here are six practical tips. The post 6 Practical Ways to Prepare for Your...

View Article

From Paper to Digital: How to Keep Data Secure

Lawyers love paper — where would they be without the legal pad? But times are changing and the move from paper to digital is happening in every industry. The post From Paper to Digital: How to Keep...

View Article



5 Ways to Sleep Easy Knowing You Can Trust Your Company Data in the Cloud

Here are five data security tips to consider to help your information security and IT teams count sheep and sleep easy with your company data in the cloud. The post 5 Ways to Sleep Easy Knowing You Can...

View Article

Dropbox, Box vulnerable to Man-In-The-Cloud Attack

At last week’s annual Black Hat conference, the security firm Imperva said they’d found a 'side door' vulnerability in several file sync and share apps. The post Dropbox, Box vulnerable to...

View Article

Keeping Research and Development Secure

With proper security measures, research and development (R&D) departments can rest assured they are protecting their IP through secure collaboration. The post Keeping Research and Development...

View Article

Industry Analysts Nominate Intralinks VIA® a Leader in Product, Innovation,...

Intralinks is pleased to be called a leader by the data security analyst firm KuppingerCole in its 2015, Leadership Compass for Secure Information Sharing. The post Industry Analysts Nominate...

View Article


U.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...

U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....

View Article

Practicing Law Securely — Working with Information Rights Management

Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...

View Article

General Data Protection Regulation: Protecting Both the Customers and the...

With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...

View Article


Saying ‘No’ to Consumer File Sync and Share Tools for Business

The tools you want to use versus the tools your company provides. Here are the risks of using consumer file sync and share tools for sharing business data. The post Saying ‘No’ to Consumer File Sync...

View Article


What are the True Business Costs of a Data Leak?

There's no easy way to put a simple price tag on the cost of a data leak. Let's look at the types of business costs that might apply, depending on the leak. The post What are the True Business Costs of...

View Article

It’s Just Crazy to Trust Your Sensitive Files to Technology That’s 40 years Old

Considering that a smart phone purchased just two years ago is nearly obsolete, imagine using computer protocols that are 30 to 40 years old for business? The post It’s Just Crazy to Trust Your...

View Article

Mitigating Risk in Your Vendor Network

A group of hackers were recently charged with stealing not-yet-public corporate news releases that covered earnings reports, personnel changes and other material information, then traded on it to the...

View Article

Cyber Insurance Is Good to Have but It Won’t Protect a Company (or a CISO)

Cyber insurance is good to have, but it won't protect a company against a breach. Insurance should be viewed as one aspect of a more comprehensive strategy. The post Cyber Insurance Is Good to Have but...

View Article


D’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches

While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...

View Article

The CSO Dilemma: We Have Found the Enemy, and He is Us

We all make mistakes. Miscellaneous/human error, while not harboring bad intentions, is still a major problem for organizations as it may cause data leaks. The post The CSO Dilemma: We Have Found the...

View Article


Audit Management: How to Save Time, Money, and Be More Secure

Audits are inevitable and finance departments must manage this process efficiently. Here's how a secure enterprise collaboration solution can help. The post Audit Management: How to Save Time, Money,...

View Article

How Do You Solve a Data Privacy Problem Like the U.S.?

Research revealed that of 20 industrialized economies, the U.S. was deemed the least trustworthy for accessing information without permission. The post How Do You Solve a Data Privacy Problem Like the...

View Article


Practicing Law Securely — Security from the Start

Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...

View Article

Information Rights Management (IRM): What It Is and Why You Need It

Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...

View Article

Mistakes: Unfortunate. Unforeseen. Unforgivable.

With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....

View Article

Collaboration Under New General Data Protection Regulations in the European...

The General Data Protection Regulation will impact businesses that operate or collaborate in Europe. How will businesses have to update policy? The post Collaboration Under New General Data Protection...

View Article


Privacy Rules Include Your Cloud Provider — Make Sure They’re Compliant

Risk and compliance challenges no longer stop at organizational boundaries. Some government rules mandate that risk management policies cover cloud vendors. The post Privacy Rules Include Your Cloud...

View Article

Browsing latest articles
Browse All 50 View Live




Latest Images