• What Are the Steps to Take When a Security Breach Has Been Identified?

    finalcode-admin|Nov 18, 2016

    Has your company taken the necessary measures to ensure that you and your customers are protected from malware and data breaches? Do you have a solid data breach incident management and data recovery plan? Recent evidence suggests that businesses are not adeq…
  • Is It Possible to Shred Digital Records Similar to Paper Records?

    finalcode-admin|Nov 3, 2016

    Organisations have to share sensitive files either between departments or with an outside organisation on a routine basis. The risk lies then, that your confidential files could be transferred beyond the security of the enterprise content management system or…
  • Downloaded Files: How Do You Protect The End Users?

    finalcode-admin|Oct 16, 2016

    Downloading malware, Trojans, and other pieces of malicious or damaging software is a serious concern amongst business owners in the Asia Pacific region. A study released in 2015 showed that trojans were found to be particularly prevalent in the Malaysian, Si…
  • Immediate steps to take when an employee loses their laptop

    finalcode-admin|Sep 15, 2016

    According to Gartner, a laptop is stolen every 53 seconds. An Intel and Ponemon Institute study in 2010 accounted 46% of such lost systems contain confidential data. The same study stated that only 30% of company systems containing confidential data are encry…
  • Unsecured USB drives – The quickest way to losing important data

    finalcode-admin|Sep 15, 2016

    Did you know that it’s been 16 years since the first commercial USB drive was launched? While there are cloud solutions today, the USB drive still remains a great compact tool for storing and transferring large amounts of data, especially as an offline soluti…
  • Sensitive Submarine BluePrints and Technical Documents Leaked Below the Digital Sea

    finalcode-admin|Sep 1, 2016

    According to Reuters, a French naval contractor DCNS said on Wednesday it may have been the victim of “economic warfare” after secrets about its Scorpene submarines being built in India were leaked. If this was economic warfare as speculated, we can expect mo…
  • How to avoid risking your digital assets – The price K Box paid for insufficient security measures

    finalcode-admin|Aug 30, 2016

    In recent news about the Personal Data Protection Commission taking action against 11 firms for data privacy breaches in Singapore, the security of digital data such as intellectual property are but a growing concern for many businesses regardless of industry…
  • Value your data privacy? Use encrypted file security.

    finalcode-admin|Aug 22, 2016

    Did you know that in 2015 alone, cyber criminals stole about 300 million records and over $1 billion across 100 banks in 30 countries? Even Fortune 500 companies, with the best perimeter defenses and purpose-built network surveillance systems, have not been i…
  • 100k+ MS & Adobe files stolen in Ohio breach – If Only Persistent File Security Controls Were Applied

    finalcode-admin|Aug 5, 2016

    Healthcare organizations are prime targets for hackers and ensuring adequate protection of sensitive information across data types, users and systems is paramount. The reported breach – – illustrates how healthcare system file collaborat…


Ensure File Security with FinalCode