Valley Hope Association’s mission is to help people overcome their dependence on alcohol and drugs. At their 16 addiction treatment centers, therapists and staff focus on helping people remove the triggers that drive their addictions in a safe and secure environment. But like so many non-profits, Valley Hope’s good intentions for protecting their patients weren’t enough to prevent hackers from exploiting their IT security weakness. Last week, 70,000 Valley Hope…
Smaller Data Footprints Lead to Trusted Reputations The well-supported adage is that it takes years to get a loyal customer and only seconds to lose them. One of the biggest mistakes you can make is putting your customers’ personal information at risk. A recent survey conducted by Ping Identity reveals many consumers are making drastic changes to the ways they interact with companies and secure their own personal data following…
Sensitive data protection continues to gain priority for many enterprises, especially from the C-suite perspective. The rise of privacy regulations such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) have increased the urgency to manage sensitive data — and to a greater extent, all data. Headlines in 2018 trumpeted major hacks and data breaches impacting millions of customers and smearing the names of several multinational…
Sensitive data falls into two broad categories: regulated and unregulated data. Regulated data is always sensitive, though to varying degrees, and should always be classified. The vast majority of unregulated data (which includes all publicly known information) is not always sensitive. However, unregulated data can also include highly sensitive information (e.g., company confidential data, intellectual property or sensitive data unique to the organization), so you must apply your data classification process…
At the 2016 RSA Conference in San Francisco, CA, Todd Feinman, CEO and Gabriel Gumbs, VP of Product Strategy presented on Sensitive Data Management Maturity – The DLP Missing Link. As a company and with the help of industry professionals, we created a Sensitive Data Maturity Model to help organizations identify where their data is, who owns it, what should be done with it, and how much of it exists….
Sensitive Data Classification Data classification is simple—it entails taking security measures by assigning a level of sensitivity to each piece of information, making it easier to locate and retrieve. Classifying data is essential in enabling enterprises to make sense of their vast amounts of data. Without sensitive data classification, an organization treats all data as if it were the same. You can’t know the level of sensitivity of any specific…
In 2016, we announced Sensitive Data Manager 9.0, our Data Loss Prevention (DLP) solution. In addition to offering the highest accuracy of data discovery and data classification, this release adds powerful, custom data discovery capabilities that reduce the burden on IT Security by allowing organizations to locate their unique sensitive data. Sensitive Data Manager 9.0 increases automation of classification and DLP security controls, reaching deep into cloud environments to further data…
Forrester recently released an insightful report Understand The State Of Data Security And Privacy: 2015 To 2016, based on hundreds of discussions with security experts. The in-depth research of the data security industry highlights which core data security technologies are in demand for 2016 and how our behaviors and motivations make data loss inevitable. It also covers why safeguarding the customer experience is essential for building trust, and why a…
Locating credit cards, personally identifiable information such as SSNs and drivers licenses is a staple of our AnyFind® technology. AnyFind narrows the likelihood of a positive match and eliminates false positives through a series of validations while looking for those discrete pieces of data the way a human would. For example, when looking for a Social Security number, if you simply look for a 9-digit number you get a lot…
This has been a busy year for cybercriminals: There were more than 600 breaches in 2015 that involved identity and data theft. Our customers, colleagues and fellow security professionals have asked us what we think 2016 will look like, so here are our cybersecurity predictions for this year. These are insights and extrapolations for the serious practitioner who makes his or her living from keeping other folks safe online. Staying…