Introducing RecordTS v4 – Record in the Cloud

Introducing RecordTS v4 – Record in the Cloud

RecordTS v4 takes a big step forward in helping customers combat insider threats. It allows you to know what your vendors, employees, and privileged users are doing. Knowing what users are doing with your company information is a key piece of telling a better security story. Our newest version of RecordTS is better than ever! What’s New With RecordTS v4? Native storage server, up to 40x faster than SQL databases Export stored sessions to a common video format for portability Universal…

Read More Read More

Why Cloud Providers Should Partner with Third Parties to Offer SECaaS

Why Cloud Providers Should Partner with Third Parties to Offer SECaaS

Today’s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and evolving vulnerabilities. At the same time, employees can now work from anywhere using mobile devices that access company data and malicious threats (from device theft to hacking to ransomware) loom large with their potential to expose that sensitive information. These threats are concerning for businesses of all sizes and across all industries — especially in healthcare and finance where laws…

Read More Read More

The 5 Basic Cybersecurity Mistakes You Make Everyday

The 5 Basic Cybersecurity Mistakes You Make Everyday

We like to think we’re quite savvy when it comes to cybersecurity at work, but it is easy to make common mistakes that can have far reaching consequences. One singular incident can cause stolen data, diminished customer confidence, reputational harm and compliance penalties that can be costly. Bad Password Practice Bad password practice is one of most well known cybersecurity risks, yet it continues to be a pervasive problem in many organizations. Innumerable data breaches are caused by poor password…

Read More Read More

Virtualization Desktop Infrastructures: The History, Benefits and Drawbacks

Virtualization Desktop Infrastructures: The History, Benefits and Drawbacks

Virtual desktop infrastructures (VDI) is a desktop virtualization approach in which a desktop operating system, typically Microsoft Windows, runs and is managed in a data center. The desktop image is delivered over a network to an endpoint device, which allows the user to interact with the OS and its applications as if they were running locally. The endpoint may be a traditional PC, thin client or a mobile device. In 2006, Virtualization Desktop Infrastructures (VDIs) began to emerge as an…

Read More Read More

5 Reasons Your Company Should Monitor its Employees’ Computers

5 Reasons Your Company Should Monitor its Employees’ Computers

  And Not Just to See If They’ve Been on Facebook   Compliance Many industries have data and employee monitoring requirements, requiring log collection and monitoring systems which provide an audit trail of all access and activity to sensitive business information. One of the most well known is HIPPA, the US healthcare industry legislation which provides data privacy and security provisions for safeguarding medical information. American financial services are regulated by SOX, a series of regulations enacted in response to…

Read More Read More

WannaCry & the Blame Game

WannaCry & the Blame Game

WannaCry and the Difficult Task of Preventing a Similar Attack The first wave of the ransomware attacks that inundated businesses around the world last week has apparently now passed, although it’s quite possible more infections will occur. The finger pointing continues between the infected institutions and the companies and governments they believe could prevent outbreaks: Microsoft, the NSA, Russia, and even North Korea. But who is to blame? Like most things, everyone is at least partly responsible. The real question is…

Read More Read More

The Effects of Patient Access to Data Cybersecurity

The Effects of Patient Access to Data Cybersecurity

Benefits vs. Consequences of Increasing Patient Power Over the past few years, there has been a shift in national healthcare systems to provide patients with greater access to their own medical records. Legal and technological trends have also granted patients more convenient access to medical records via the internet. As of 2017: United States: The Health Insurance Privacy and Portability Act (HIPPA) stipulates that patients must be permitted to review and amend their medical records. (1) United Kingdom: British GPs…

Read More Read More

Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data

Cybersecurity in the Healthcare Sector: Securing Sensitive Cloud Data

The number of American healthcare data breaches almost doubled in 2016, averaging more than one data breach per day in 2016 for a total of 450, up from the 253 breaches that took place in 2015. (1) The 2016 Data Breach Incident Report describes healthcare as one of the most affected industries by cybersecurity threats, both insider and privilege misuse. (2) Half of the breaches were caused by insider threats and the remaining were from external forces which included hacking. It is…

Read More Read More

The Cloud and the Need to Monitor User Activity

The Cloud and the Need to Monitor User Activity

With the advent of server virtualization and cloud technology, there has been a need to monitor user activity. Clean Rooms & Mainframes Computing technology has come a long way. Its early beginnings started in clean rooms filled with large, ceiling high mainframe computers. A separate room lined with rows of terminals on tables was for user access. Pull up a chair and log in remotely to the mainframe for your own personal computer account. You shared the system with dozens of other users, each being…

Read More Read More

Welcome to our blog!

Welcome to our blog!

  Welcome to our first post InfoDigest Digest! This is a blog where we will discuss all the latest happenings in the cybersecurity world. In future posts, we will discuss monitoring user activity, data security and HIPPA, technological vulnerabilities in the financial sector as well as technical how-tos!