Unprotected File Sharing Gets Expensive

Compliance, HealthCare, Healthcare Information

A Recent $2 Million HIPAA Penalty for Exposed Patient Data If you work in a health care organization and handle sensitive patient health data, you’ve probably heard about the recent case in which US regulators hit St. Joseph Health System with a penalty of $2.14 million for HIPAA violations. That penalty is just the tip of the iceberg: St. Joseph …

Rocks stacked in the corner of a brick wall

Data Protection: The Cloud Security Cornerstone

Cloud Data Security

Not Your Grandma’s IT Security Concern Not that long ago, the main concern of network security professionals was protecting the company’s network perimeter. Servers, not data, was the issue. When the cloud rolled in, the IT security landscape began to change profoundly. When companies use cloud services, effectively they’re outsourcing the care of their data. Unfortunately, they can’t outsource their …

horse and rider soar over city

Recognized Leadership vs Claims of Leadership

Announcements, CASB

Getting Beyond the Noise Technology products often are overhyped, and products in the CASB space are no exception. CASB players proliferate amid an abundance of venture money and self-proclaimed market and technology leadership. Customers rely on competitive analysis from independent sources to cut through the noise and provide a clear picture of what vendors really have to offer. The first …

goalkeeper blocks soccer ball

Cloud Data Isn’t Lazy Data

Cloud Data Protection

Why your cloud security strategy shouldn’t rely solely on data-at-rest encryption In our last blog post, we revealed that cloud provider “Bring Your Own Keys” (BYOK) options merely let customers keep a copy of their keys, not own the whole set of keys. In this post, we’ll look at the SaaS application environment in detail to understand why data-at-rest encryption …

Hardware store clerk with keys

Does BYOK Mean ‘Barely Your Own Keys’?

Cloud, Compliance

3 Truths about Encryption and BYOK Many people making important decisions about data security have a fuzzy understanding of how encryption actually works. Their confusion can easily be exploited by hackers, governments, and vendors pushing incomplete solutions. That’s because, on the surface, encryption seems reasonably easy to understand with real-world analogies to keys, locks, secrets (both good and bad), and …

Putting the “S” in CASB ­­­­­— Safeguarding Cloud File Sharing

CASB

As we have discussed in a recent blog post Cloud File Sharing has big rewards and big risks. Driven by workforce trends that have teams spread across the globe both internal users and external partners need to share information anytime, anywhere to be effective. Understanding the Risks It is inevitable that users will turn to file sharing clouds like Box, …

file-sharing-ethical-firewalls

How to Establish Ethical Firewalls for Cloud File Sharing

CASB, File Sharing

The cloud enables your team to collaborate easily, but collaboration in the cloud shouldn’t mean a loss of control over who shares files with whom. This isn’t just about protecting your files against outside threats. Even within a business, not all employees should have access to all documents. In the financial industry, many firms have compliance requirements to separate the …

ChalkTalk: Deeper Dive on Cloud File Sharing Use Cases

CASB, File Sharing 0 Comments

In part 2 of our Cloud File Sharing ChalkTalk series, watch as Ankur Shah does a deep dive into real-world customer use cases for avoiding the compliance and privacy risks associated with file collaboration services. Full transcript below: Hello. Welcome to one more edition of CipherCloud ChalkTalk. My name is Ankur . I’m head of product at CipherCloud. In today’s …