Data security is at the heart of the upcoming General Data Protection Regulation (GDPR). It sets strict obligations on data controllers and processors in matters pertaining data security while concurrently providing guidance on the best data security practices. And for…
You’ve probably been investigating 2-Factor Authentication (2FA) more recently. With each new data breach in the news, you increasingly realize that security doesn’t end with strong passwords. Two Factor Authentication, also known as 2FA, is a two-step verification method that…
The countdown for the European Union’s General Data Protection Regulation (GDPR), which will go into full effect in May 2018, is coming to a close. GDPR aims to solidify the data privacy rights of EU residents and the requirements…
The democratization of high-speed Internet coupled with the development of distributed information exchanges gave rise to the development of blockchain technology. Blockchain is the underlying technology that powers the crypto-currency Bitcoin; however, its uses transcend that. Simply put, a blockchain…
On the 31st of October 2008, the still mysterious Satoshi Nakamoto (probably a pseudonym for an individual or group) published a white paper introducing the concept of a peer to peer digital cash system referred to as Bitcoin. Bitcoin marked…
Over the past decade, cloud computing has transitioned from being a buzzword to becoming a staple technology for most enterprises, mainly driven by cloud’s accessibility, superior flexibility, and capacity compared to mainstream computing and storage techniques. However, just like mainstream…
FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery. FileCloud is deployed across 90 countries and has…
New Technology File System (NTFS) Hierarchical Tree Structure of NTFS One of the most important and often misunderstood pieces of functionality in Microsoft Windows is the File and Folder security permissions framework. These permissions not only control access to all…
In 2015, there were 38% more security incidents than 2014, and an average cost per stolen record – containing sensitive and confidential data – of $154 (the healthcare industry payed the most, at $363 per record). Worse still, even when…
According to data collected by the HHS Office for Civil Rights, over 113 million individuals were affected by protected health information breaches in 2015. Ninety-nine percent of these individuals were victims of hacking, while the remaining 1 percent suffered from…