Posts

How to detect data breaches

Most people do not know where all their important files are, and this makes detecting data breaches tad difficult. To fully understand where data is, companies use data indexing solutions, but these are expensive and come with a significant IT overhead. There are, however, simpler ways to get just enough insight into where important files […]

GDPR significantly broadens the scope of data privacy requirements: are you in, or out?

The European Data Privacy Directive (Directive 95/46/EC of the European Parliament), is still the data privacy law in effect today in the European Union. This year, its replacement, the General Data Protection Regulation was adopted and will come into effect in 2018. GDPR will significantly broaden the scope of the data privacy requirements both regarding […]

Tesco Bank: Money stolen from customers’ accounts – thousands affected

Last weekend brought unpleasant surprises for the customers of Tesco Bank, the banking system of a major retailer in the UK. Following a stream of suspicious online transactions, some resulting in fraudulent withdrawals, the bank decided to cease online operations on Sunday. Why is this important for all of us? Because it was the first […]

How to monitor Skype file sharing from corporate endpoints

Skype is a popular communication platform, so companies who are concerned with data security, compliance and assessing the risk of data leakage, look for solutions that enable control and visibility into the Skype file sharing service. Knowing who shares files and which files are being shared, helps to understand the risk of data leakage and […]

Five ways in which TEMASOFT FileMonitor can help healthcare organizations

Monitoring and analyzing how files are being accessed, how they change, and how they move around the IT environment brings many benefits for healthcare organizations looking to meet HIPAA compliance and mitigate the ransomware threats. Comply with HIPAA IT auditing requirements HIPAA requires activity monitoring and access auditing for informational systems (defined as hardware, software, […]

How to Monitor Google Drive Uploads from Corporate Endpoints

Insider theft and misuse are a major area of concern when it comes to protecting information and complying with security standards and legal requirements. Cloud-based file storage services are very popular especially for consumers who use them to store their personal files. In many cases, employees use cloud synchronization services at work as well. This […]

European data privacy regulation – what makes “personal data”?

Background In Europe, the first data privacy considerations were brought to the European Council’s attention in 1980 as “The Organization for Economic Co-operation and Development” issued recommendations in this respect. In the document “Recommendations of the Council Concerning Guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data” OECD released seven principles governing […]

TEMASOFT proudly sponsors the “2016 Insider Threat Spotlight Report.”

The Insider Threat Spotlight report is based on a survey of more than 500 security professionals at various career levels, conducted by Crowd Research Partners in collaboration with the Information Security Community on LinkedIn. TEMASOFT is committed to supporting customers in building better data protection strategies and therefore is very interested in the latest experiences, […]