
Trevor Morgan
Product Manager feature_status*/ ?>
comforte AG
Comments Dotted :
22
December 10, 2020
All enterprises should take away from this incident a very simple lesson.
The ransomware attack affecting the cloud hosting service provider Netgain must be of concern to its customers. All indications show that Netgain has been working very proactively to isolate and mitigate the situation while keeping the customer base fully informed. This response is appropriate and admirable given the situation. In the wake of these types of data security incidents, the best-case scenario is that the service disruptions are a nuisance but that sensitive data remains protected.
.....Read More

November 23, 2020
Organizations should consider data-centric protection methods.
The unintentional but unfortunate exposure of personal data for which Pray.com is responsible for care-taking should remind every organization to rethink their data security for cloud-based applications and storage. The assumption that cloud providers take care of every aspect of security for their enterprise customers is a faulty one—each organization bears the responsibility to provide an adequate level of data protection for information they process or store in their cloud repositories......Read More

November 19, 2020
Steeper fines only add to the incentive for companies to comply with data privacy mandates.
The introduction of Canada’s proposed Digital Charter Implementation Act continues the trend toward tighter governmental regulation of businesses handling and processing consumers’ private and sensitive data. Steeper fines only add to the incentive for companies to comply with data privacy mandates, joining other negative outcomes such as tarnished brand reputation and loss of trust in the offending business.
The move should serve as a strong reminder to businesses located or operating.....Read More

November 16, 2020
The best part is that data-centric security travels with the data.
The Vertafore data breach, in which the personally identifiable information of millions of Texas drivers was revealed, reinforces the weaknesses inherent in a perimeter-only strategy. The breach was reported to have occurred due to the sensitive data being transferred to an unsecured external storage device. If that data itself had been secured, rather than relying on the security mechanisms of the storage device or the perimeter around it (or lack thereof), then the data essentially would be.....Read More

October 29, 2020
A data-centric approach means applying strong security mechanisms.
When multinational companies are hit by attacks and data breaches, it’s very easy and tempting to dismiss the situation as something that could never happen to our own organization. Whether this complacency is due to over-confidence in our data security strategy or unwillingness to entertain the possibility at all, complacency itself becomes an opening and a weak spot in your defenses. The recent ransomware attack suffered by Enel Group—the second one this year—shouldn’t lead to.....Read More

September 14, 2020
Data-centric security addresses the need for security to travel with the data it protects.
Managing and securing customer data is no game – the breach at Razer is another testament that privacy requires organizations to take data security seriously and move beyond reinforcing perimeter and access controls. This is not to say that they need to neglect perimeter security. However, no matter how much effort and investment are poured into securing the borders of their data environment, sensitive data inevitably will wind up in the wrong hands—either through intentional intrusion and.....Read More

September 11, 2020
If you don’t have the in-house knowledge, then you should consult with data-centric security experts.
Equinix’s recent disclosure of a ransomware incident appears to be hopeful in that the exposure of any sensitive information seems to be mitigated and the situation is under control. What this incident reveals—and what every organisation should take away from it—is that if an IT leader such as Equinix can experience this, so can any other business or organisation. Fortunately, Equinix has the in-house knowledge and resources to handle sensitive data effectively and remain in compliance.....Read More

September 01, 2020
This has a decidedly sweeping and negative effect that can be quantified, too.
The costs of a data breach, as indicated by the RiskIQ report, are mind-boggling when you think of the aggregate effect on economies overall and how those costs ultimately can trickle down to all organizations. When an attacker successfully targets an organization, the costs can have a serious negative effect on the business’s bottom line.
Yet another often-overlooked cost is what these successful attacks can do to any organization’s brand reputation and the customer loyalty it has.....Read More

August 13, 2020
But the most damaging part of any data breach is the loss of trust and the brand reputation which can result from a data breach.
The mission of ProctorU is a good and beneficial one, ensuring that test-taking is fair and conforms to the rules. The irony in this data breach is that ProctorU specializes in monitoring (the testing process), but they overlooked the risks to their own data environment. Unfortunately, peoples’ private data is now compromised, and ProctorU must exert time, effort, and expenses in an attempt to mitigate the situation. But the most damaging part of any data breach is the loss of trust and the.....Read More

July 23, 2020
Many encryption algorithms can be easily cracked.
As the Family Tree Maker scenario clearly displays, security administrators, need to move beyond reinforcing their perimeter boundaries and access mechanisms. This is not to say that they need to neglect perimeter security. However, no matter how much effort and investment are poured into securing the borders of their data environment, sensitive data inevitably will wind up in the wrong hands—either through intentional intrusion and theft, unintentional distribution, or pure lack of.....Read More
