GDPR significantly broadens the scope of data privacy requirements: are you in, or out?

The European Data Privacy Directive (Directive 95/46/EC of the European Parliament), is still the data privacy law in effect today in the European Union. This year, its replacement, the General Data Protection Regulation was adopted and will come into effect in 2018. GDPR will significantly broaden the scope of the data privacy requirements both regarding […]

Tesco Bank: Money stolen from customers’ accounts – thousands affected

Last weekend brought unpleasant surprises for the customers of Tesco Bank, the banking system of a major retailer in the UK. Following a stream of suspicious online transactions, some resulting in fraudulent withdrawals, the bank decided to cease online operations on Sunday. Why is this important for all of us? Because it was the first […]

FBI Urges Ransomware Victims to Report the Attacks

Healthcare organizations in the US fall under the scope of the “Health Information Technology for Economic and Clinical Health (HITECH) Act” which enforces the requirement of reporting data breaches to the authorities, as well as take certain measures when such incidents occur. Each incident that has the potential to affect more than 500 persons must […]

How to monitor Skype file sharing from corporate endpoints

Skype is a popular communication platform, so companies who are concerned with data security, compliance and assessing the risk of data leakage, look for solutions that enable control and visibility into the Skype file sharing service. Knowing who shares files and which files are being shared, helps to understand the risk of data leakage and […]

Five ways in which TEMASOFT FileMonitor can help healthcare organizations

Monitoring and analyzing how files are being accessed, how they change, and how they move around the IT environment brings many benefits for healthcare organizations looking to meet HIPAA compliance and mitigate the ransomware threats. Comply with HIPAA IT auditing requirements HIPAA requires activity monitoring and access auditing for informational systems (defined as hardware, software, […]

How to Monitor Google Drive Uploads from Corporate Endpoints

Insider theft and misuse are a major area of concern when it comes to protecting information and complying with security standards and legal requirements. Cloud-based file storage services are very popular especially for consumers who use them to store their personal files. In many cases, employees use cloud synchronization services at work as well. This […]

European data privacy regulation – what makes “personal data”?

Background In Europe, the first data privacy considerations were brought to the European Council’s attention in 1980 as “The Organization for Economic Co-operation and Development” issued recommendations in this respect. In the document “Recommendations of the Council Concerning Guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data” OECD released seven principles governing […]

2016 Ponemon Cost of Data Breach Study – The less obvious conclusions

The 11th edition of the 2016 Ponemon Cost of Data Breach Study presents an in-depth analysis of the cost of data breaches across the world, its specific components and the factors that affect it. At the same time, the study provides insights into the likelihood of data breaches for the next year. This year’s report […]