datasecurity

The Panama Papers 2.6 Terabyte Terror

“This is not a leak. This is a Hack.” – Ramon Fonseca

Known to be the largest and now most controversial data leak of all time, the Panama Papers is a prime case to be examined by information management providers. Mossack Fonseca, an international law firm, is now facing extreme backlash for their ties to foreign money.  Hacked and leaked by an anonymous source, this is the largest recorded data breach in history. The crime in question, the hacking of Mossack Fonseca’s private information has been overshadowed by the scandal of their relationships to foreign politicians and what some are saying, dirty money.

Hacking can occur in a number of ways. The computer systems itself can be hacked and mined for information. Websites can be compromised and emails can be phished. If your organization is a target for a cyber hacking, there’s not much you can do to prevent it. See how the NSA, JP Morgan Chase, and Sony Entertainment couldn’t help but be victims to malicious targeted cyber hacks & data leaks.

However, if you’re not a target with a big red market on your back, then it’s still better to be safe than sorry. Take precautions by improving your information security so that an accidental hacking doesn’t tear down your organization. Here are 3 easy benchmarks any organization can check off, to proactively combat a potential cyber hack.

1.    Perform required software updates for your document management systems, operating systems and web browsers.

2.   Ensure implementation of appropriate firewalls to servers, networks, and devices.

3.   Manage all passwords with an encryption software or change your passwords often.

It seems to be that cyber hacking is the new cool but that’s what makes this all the scarier. As intelligent engineers are lured into employing their skills towards malicious criminal activity, all an organization can do is be aware, proactive, and smart about how their information is controlled.

 

4 Keys to Assessing Quality for Enterprise Content Management (ECM)

Is your Enterprise Content Management at the quality that you expect for your organization? Optimize your ECM system to be the best that it can be. Apply these 4 quick FileTrail tips to your ECM strategy, today.

1. Information Governance (IG) Strategy

The first key to assessing quality for ECM is an IG strategy. Has your organization developed a framework for Information Governance goals and benchmarks? IG stakeholders to look at are:  authorities, supports, processes, capabilities, structure, and infrastructure. Go through these one by one and develop a plan for how these stakeholders should work to support compliance requirements, business needs, and utilize available technology.

2. Clean Data Migration

The next key to assessing quality for ECM is validating your data. Migrating dirty data is a complete waste of time for everyone involved.  Minimize errors and duplications to confirm that your information, whether digital or physical, is cleaned up before migration.

3. Standardized Processes

The third key to success I mean, to assessing quality for ECM is standardizing processes. Stated previously as a stakeholder in key number one, this deserves more attention. If your organization runs through different offices, cities, countries, and etc, it’s important to ensure that all employees know the correct way to capture and secure information. A standard method minimizes errors and duplication, effectively reducing  risks while increasing security. Remember, 95% of cyber breaches are user error, so supply your employees with training on standard processes and best practices.

4. High User Adoption

The last key to assessing quality for ECM is ensuring your system encourages high end-user adoption rate. If your organization implements an ECM system but your employees find it either too difficult to use or simply don’t like it, you won’t be able to capture and store the information that the organization must secure. This is where you keep it simple. Provide a software that is modern and user friendly with tools to help access and retrieve information quickly. If it helps to ease their tasks and increase their productivity, the bonus will be for both the user and the organization.

 

 

3 Steps to Protect Against Cyber Breaches

As an organization protecting sensitive data, you do everything in your power to prevent cyber breaches. However, you do wonder how easy it can be for someone to break into your system and take all that they want. Hacking groups have become infamous since the Sony Entertainment breach and JP Morgan Chase chaos.

The most current cyber security breach made public, is happening right now. With the news on the current US primaries, Republican front runner Donald Trump has been chosen by international cyber hacking group Anonymous as their next target. According to a Newsweek article, private information has been leaked by the group pertaining to Trump’s identity, campaign, and business. The group of cyber hackers is calling this their second of three attacks aimed at the politician. With such a large profile case, organizations should take this moment as a learning tool to help protect themselves against cyber breaches.

Here are 3 steps your organization can work on to ensure a more protected network system.

1.    95% of Security Breaches are User Error

The best thing any organization can do to ensure security, is to train employees properly. This proactive approach alters the culture of a company to be more security cognizant. Proper training will help eliminate common mistakes that could leave weak spots prone to cyber-attacks. Employees will also become more aware in noticing odd behavior by phishers, fraudsters, and even malicious inside users.

2.    Restrict High-Risks Access

For an organization’s security strategy, consider limitations to what sites your employees can visit while on the company’s network. Many breaches can occur via drive-by downloads from compromised websites. Being able to control what websites are white-listed for employee access, is a key security policy for protecting sensitive, high risk information.

3.    Test, Test, Test

As an organization, you should always be on the lookout. Performing regular vulnerability assessments must be required for your information security team. If you’re a large enterprise with droves of information that needs to be secured, these should be done weekly. Vulnerability test should scan against every system in your company’s network, both internal and external.

Being proactive is the first step in this strategy as employees are often the first responders to data security breaches and abnormalities. A wide open access to the internet may not be the best idea while on your private networks. Having a plan and always being on the lookout, may be the trick to keeping your organization clean of security breaches. Take these 3 key steps and prepare your trump card for when cyber warfare comes your way.