Zix Blog

Securing Data Three Ways: At Rest, Use and In Motion

Mon, 02/01/2016 - 11:32 by ZixCorp
Sensitive data, both personal and corporate, is more vulnerable today than ever before. Pick up any recent newspaper, and odds are that some sort of data breach or vulnerability has occurred. Social Security and credit card numbers, corporate trade secrets, financial news – any data that is stored, used and transmitted online and through connected devices can be exploited and monetized by a skilled and motivated hacker. But these threats aren’t just external. The threat of a disgruntled or even rushed employee is as real as the threat from outside attackers, especially if the...
Read More

What does Winston Churchill’s Foot Tell us About Mobile Security?

Mon, 01/04/2016 - 11:57 by Neil Farquharson
Most people will recognize the name of legendary wartime leader Winston Churchill: As well as having a United States Navy destroyer named after him , he is one of only eight people ever to have been proclaimed an Honorary Citizen of the United States . One of the many bronze statues of Churchill is at the south entrance to the lower chamber of the British Parliament in London; and for many years, Members of Parliament (MPs) entering the voting chamber would rub the left shoe of the statue for luck, in the hope that their government bill would pass. You wouldn’t think that rubbing your hand...
Read More

A BYOD Post-holiday Story

Tue, 12/22/2015 - 10:37 by ZixCorp
Oh, the holidays — a time filled with friends and family, wrapping presents, decorating cookies and getting the latest and greatest gadgets! It’s safe to say that many employees will receive shiny new phones and tablets this holiday season, and they’re bound to bring them in to work. But what do IT departments really think of your new toys? Here’s how Ralph — the head IT guy — sees it after the holiday break. Envy Here I am, just hanging in the break room with my leftover turkey sandwich, when Steve walks in with his brand new smartphone. Yeah, sure — I got a pretty sweet new sweater for...
Read More

Your Zix Team Has Your Back

Wed, 12/16/2015 - 11:38 by ZixCorp
It’s the time of year when IT and financial managers review their data security coverage and make adjustments for the coming New Year. Have you increased staffing levels during 2015, or allowed more folks to use BYOD smartphones or tablets to handle their corporate emails? If so, now is the time to add additional licenses for them. As you already know, staff who use Zix Email Encryption benefit from the easiest to use on-premises or cloud-based solution. ZixGateway works in the background – in real time – 24/7. No passwords or extra steps are required for employees or...
Read More

Regulatory Fatigue Hits Financial Institutions

Wed, 11/18/2015 - 11:46 by Neil Farquharson
Reading through Thomson Reuters’ annual Cost Of Compliance report makes troubling reading. Compliance officers are “experiencing regulatory fatigue and overload in the face of snowballing regulations.” Of the 600 compliance practitioners from financial services businesses who were surveyed, 70% expect regulators to increase their regulatory burden in the following twelve months. Given their beliefs, and the volume of regulatory change, the survey respondents are being hard-pushed to maintain compliance and data security. Worse, in their most recent corporate governance...
Read More

Manage Holiday Stress with BYOD

Mon, 11/09/2015 - 13:04 by ZixCorp
It’s that time again. Hectic parking lots, crowded malls and full social calendars — the Holidays are officially upon us. Besides some well-deserved — and likely much needed — time off, what’s the best gift an organization can give to its employees? Many would agree that having the ability to take time off without coming back to a deluge of emails and to check into the office with minimal disruptions to quality family time — or the ability to BYOD — is quite the gift. With BYOD, employees are no longer restricted to the walls of their offices or tied to their laptops. Email, documents and...
Read More

Google’s Project Zero Discovers More BYOD Vulnerabilities

Thu, 11/05/2015 - 13:38 by Neil Farquharson
Google’s Project Zero team has just made public a series of security flaws found on the popular Samsung Galaxy Edge smartphone. Project Zero is a team of Google security analysts formed in July of 2014 with the aim of finding zero-day exploits . It is most famous for releasing details of an exploitable Windows 8.1 bug in January 2015 after giving Microsoft a 90 day notice to issue a patch. Source: Kārlis Dambrāns For the new Galaxy Edge S6 analysis, the Project Zero team gave themselves one week to attempt three challenges: Gain remote access to contacts, photos and messages Gain access...
Read More

Why Businesses Should Not Trust Remote Wipe or Kill Switch Commands

Fri, 10/23/2015 - 11:17 by Neil Farquharson
I’m becoming increasingly concerned that businesses are relying on the remote wipe instruction to protect their data. Articles like this one from CNET talk about the new Californian law that implements kill-switch functionality on smartphones, while a multitude of articles such as this one from the New York Times espouse remote wipe functionality. However, as I explained in April , these solutions are way off base and do not truly protect company data. Let me explain. The reason for the kill-switch is to deny the thief the future use of the stolen phone. This makes perfect sense to the...
Read More

Zix’s Hacker Series Continues: David Kennedy on Mobile Devices

Thu, 10/22/2015 - 11:15 by Neil Farquharson
Regular readers may remember this blog referring to the ease with which hackers can intercept emails being transmitted over unprotected fiber optic cables. I’m now pleased to share with you that David Kennedy, the renowned security expert, has agreed to be interviewed during a live Webinar scheduled for November 11 th at 2 p.m. ET. During the interview, I will ask David for his views on the current security levels of mobile devices such as smartphones and tablets. Just how easy is it to compromise mobile devices remotely, or while in the physical possession of hackers? Can operating...
Read More

Customer Spotlight - For First State Bank of Rice, Investing in Cybersecurity Is a Way of Life

Thu, 08/27/2015 - 11:01 by ZixCorp
Data breaches can happen for a number of reasons. A thief can get a hold of an employee’s mobile device that contains corporate data, an employee can accidentally forward sensitive information to the wrong email address, or a hacker can even intercept unencrypted email containing personally identifiable information. While these scenarios are all very different, one thing is the same – they can all lead to a data breach with private information exposed. In working with managed service provide Unicom Technologies Inc., First State Bank (FSB) of Rice could identify evolving threats...
Read More

Pages

Subscribe to RSS - BYOD

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More