News Coverage
News Coverage
“The damage from the insider data breach could have been much worse. With all of the layers of security available, organizations like the benefits vendor have no excuse when it comes to preventing data leakage of customer information or intellectual property. Once unencrypted data is out there, it’s out there. Organizations should foresee this occurring and apply file security and policies beforehand.”
“Whether the criminals plan to use the customer and employee credit card, bank statement, passport, ID and insurance card details they leaked for fraud or not, the fact that this sensitive information is now available online is disturbing.”
“…opening a new regional headquarters in Singapore… the result of the continued success FinalCode is experiencing… allows any business to persistently protect sensitive files, both inside and outside the business… available as software as a service (SaaS) or as a virtual appliance.”
“The compromised data (fresh or not) can be abused by hackers to put together more sophisticated scams. Financial services firms, like in other regulated industries, need to expand their data defence portfolios… securing files that may be exposed due to inadvertent emails, lost portable storage devices or unauthorised sharing.”
“…benefits manager who received the employee information. This minor Google breach serves as a cautionary tale that sensitive information can be taken with malicious intent?or in this case?sent by accident. Once unencrypted data is out there, it’s out there. Organizations should foresee this occurring and apply file security and policies beforehand.”
“Each government agency has some leeway about how it implements encryption to address its own data security risks…Certain agencies, such as defense and intelligence, require stronger encryption, like the use of Suite B algorithms, and they are exploring the use of quantum-safe crypto technologies.”
“Hackers recently published 1.5 GB of documents, including customers’ bank details, birthdates and phone numbers, that they claimed were stolen from the Qatar National Bank (QNB), Reuters reports… it is imperative to consider the grave consequences of data leakage as confidential files are shared.”
“The interdependencies between banks, industry, government agencies and private citizens make it imperative to consider the grave consequences of data leakage, inadvertently or subversively, especially as confidential files are often shared between different entities…Financial services firms, like in other regulated industries, need to expand their data defense portfolios beyond that of thwarting hackers and monitoring for insider threats to securing files.”
“Files may be exposed due to inadvertent emails, lost portable storage devices or unauthorized sharing… ?the best approach to prevent file data leakage is through the use of strong encryption and usage control.”
“Enable business by showing your clients enhanced data protection capabilities. New persistent file security tools make it possible to keep your customers’ trust and preserve your reputation, even during the tax extension rush. Financial services firms need solutions that not only thwart hackers and insider threats, but also protect information in the event files are exposed by inadvertent emails, lost portable storage devices or undocumented transfers.”