Emergency phone and internet data storage law to be brought in0

Emergency legislation will be brought in next week to force phone and internet companies to log records of customer calls, texts and internet use.

Ministers say it is necessary so police and security services can access the data they need after a legal ruling which declared existing powers invalid.

The proposed law has the backing of Labour and the coalition parties.

A special cabinet is being held to agree the planned laws, which will only last until 2016.  … Read more →

Booking site HotelHippo.com in ‘appalling’ data leak0

A hotel booking website that was leaking large amounts of customer information is being investigated by the UK data privacy watchdog.

HotelHippo.com, owned by HotelStayUK, had revealed booking information that had been a “gift for burglars”, a security expert said.

The exposed data could allow the matching of hotel bookings with home addresses.

After being contacted by the BBC, HotelHippo.com was taken offline.  … Read more →

What is OWA and why should you classify this?0

The Outlook Web App or OWA is a web based email client based on Microsoft Exchange Server and it provides clients with a seamless email solution offering full contact and calendar functions along with access to voicemail, instant messaging and SMS messages entirely on one system. The web app is now commonly available across multiple web browsers and includes an efficient and user friendly control panel and interface including web sharing which enables users to share their own calendars with non-exchange users. There is often some confusion between OWA and Microsoft Outlook because they work in very similar ways; this technology however requires an internet connection in order to access email communications.  … Read more →

Hackers Steal Thousands From Bank Customers0

A trojan attack on an unnamed European bank has seen €500,000 (£401,000) stolen from 190 victims – before the criminals responsible removed “every shred of evidence” that could trace them.

Customers lost between €1,700 (£1,362) and €39,000 (£31,269) each during a one-week period.

Two days later, “every shred of evidence” that could have been used to track down those responsible was automatically erased by the software.  … Read more →

Varonis DatAnywhere0

A few weeks ago, Varonis announced that DatAnywhere is now completely free for up to 5 users.

varonis datanywhere free 5 users download

 

 

 

Varonis DatAnywhere turns an organisation’s file shares into a secure private cloud, providing employees, business partners and clients with secure mobile access and file synchronisation to files stored on the organisation’s internal file shares and NAS devices.  … Read more →

Do you have any data loss prevention policies in place?0

Security issues and data loss often feature frequently in the news with even some of the most high profile businesses encountering security breaches. This has a significant impact on both customers and employees, not only the company name. Since these high profile cases of data loss many businesses including small and medium enterprises are looking to review or even implement for the very first time data loss prevention policies.

What is Data Loss Prevention (DLP)

Most enterprises have clearly defined policies when it comes to data protection, but enforcing these policies at the end user level is difficult.

Data loss prevention (DLP) is not a simple tool or solution, but an approach that applies technology to enforce your data protection policies and mitigate the risk of lost data.

Using a combination of methods including data classification, permission management, data ownership and website security, we can provide data loss prevention solutions that offer complete peace of mind and full end user accountability.

Varonis

Varonis is one of our leading suppliers in the provision of data loss prevention and offer a range of products suitable to address all data security requirements. Deciding which software to use ultimately depends on your business and the way in which solutions are to be deployed within the existing infrastructure. One of the main solutions that Varonis can help your business is through its DataPrivilege solution addresses issues surrounding data entitlement management and seamlessly manages automation of access authorisation, entitlement reviews, policy enforcement and compliance reporting.

The key benefits of this software includes;

  • Ability to provide data owners with comprehensive recommendations relating to access removal
  • Seamless access control workflows granting users access requests to specific data sets
  • Consistent implementation of business policies
  • Accessible self service data governance portal for users and data owners
  • Clear and concise audit trail

Boldon James

Boldon James are another leading provider of data loss prevention systems which can be implemented to strengthen your existing data security policies and procedures. Whereas Varonis focuses on establishing permissions, Boldon James look instead at the documents themselves with a range of solutions to classify particular sets of documents including emails, Notes, Office, SharePoint and CAD to name a few.

One of the areas where data loss often occurs is through emails, whether they are accessed by a third party during transit or they are mistakenly sent to the wrong individual. Boldon James email classifier ensures that this doesn’t occur. This solution puts labelling at the forefront of data loss prevention strategies by allowing users the ability to apply labels to emails within Microsoft Office and integrate these into the metadata of the email message.

Key Benefits of Classification Software;

  • Strictly enforces information assurance procedures and policies
  • Increases end user awareness of the data they are handling
  • Boosts the effectiveness of wider data loss prevention policies
  • Implements consistency and strict controls for unstructured and fragmented data disseminated across the network
  • Seamlessly safeguards even the most sensitive content
  • Allows system managers to view user behaviour and how documents are being used
  • Very low implementation and ongoing management costs

Whichever solution you opt for, they are all effective ways of both strengthening your data loss prevention policies and working in the background to ensure that the requirements of these policies are not only applied consistently for all users but are strictly enforced, significantly reducing or even eliminating all of your data loss concerns.

Hand Over The Dough! Domino’s Pizza Hacked0

Hackers who cracked the Domino’s Pizza database say they have stolen the details of more than 600,000 customers – including their favourite toppings.

A hacker known only as Rex Mundi said the full details would be released today unless the firm paid him or her €30,000 (£24,000).

Mundi said the “vulnerable” shared servers of Domino’s Pizza in France and Belgium were compromised, with a range of customer details stolen.  … Read more →

Varonis – “Anatomy Of A Phish”0

Security analysts have been telling us that phishing incidents have been on the rise, and the threat will get worse in the coming years. Sure phishing and other social attacks are insanely clever, tricking victims into effectively inviting hackers in through the front door. But when cyber thieves also use advanced persistent threats or APTs—embedding this stealthy malware in the phish mail—the attack becomes even deadlier.  … Read more →