Zix Blog

The Director of the NSA Endorses Encryption

Mon, 01/25/2016 - 17:47 by Neil Farquharson
Admiral Michael S. Rogers Over the weekend, I caught up with the recent activity at the Atlantic Council in Washington, D.C. They’d managed to entice Admiral Michael S. Rogers, who is not only the Commander of U.S. Cyber Command, but also the current Director of the National Security Agency (NSA) to appear. During a live presentation followed by an hour long interview, Admiral Rogers displayed great passion about a number of issues, including the “increased apertures of exposure” created by the constant connectivity provided by mobile devices; describing the Internet of...
Read More

When it Comes to Email Security, Automation is Key

Mon, 10/26/2015 - 10:45 by Neil Farquharson
We’re always reading about the clever hacks of data networks perpetrated by exploiting any of the hundreds of bugs in Windows, Unix/Linux, Mac OS and so on. Indeed there is now a giant market for companies that offer penetration services: that is, white hat hackers who will, for a fee, systematically attack a client’s network looking for these security weaknesses. John Owen Brennan, victim of email hack Back in May, I wrote a couple of blogs about Kevin Mitnick, the world’s most famous hacker. I’d just read one of his autobiographies and was surprised that despite all...
Read More

Data Security Role of FTC Is Upheld

Wed, 08/26/2015 - 12:04 by Neil Farquharson
Regular readers know that I recommend every type of organization protect itself against data breaches, not just those operating under regulatory mandates. There has long been an argument that modern legislation such as the Fair Credit Reporting Act, the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA) offer sufficient protections to businesses and consumers, hence it probably came as a shock to global hotel company, Wyndham Worldwide Corp, when they were sued by the Federal Trade Commission (FTC) under Section 5 of the Federal Trade Commission...
Read More

Newswire Services Aren’t the Only Exposure for Public Companies

Wed, 08/12/2015 - 15:13 by ZixCorp
For years, the top markets investing in data protection were healthcare, financial services and government. The reasons were clear: These companies and organizations collect, manage and exchange an endless amount of personal data – social security numbers, health records, banks accounts, etc. – and data protection is crucial to maintaining trust with clients, patients and the public. With so much personal data, these same companies and organizations are highly regulated, and data protection is required for regulatory compliance. See acronyms such as HIPAA and GLBA . Some companies that...
Read More

You’ve suffered a data breach! Now what?

Wed, 06/24/2015 - 18:36 by ZixCorp
As breaches have recently become a weekly occurrence — executives, IT departments and legal teams are wracking their brains to pinpoint the problem and identify solutions. But is anyone asking what is on the minds of the customers affected? We are. And that is precisely what we explored in a recent survey that sampled more than 500 Americans. Through the results, we concluded two main points – People are not as educated as they might think in regard to the severity and types of breaches that have been splashed across headlines. People want to be in the know regarding a breach as...
Read More

Customer Spotlight – The Miller Group Looks to ZixCorp to Thwart Email Data Breaches

Thu, 05/14/2015 - 12:46 by ZixCorp
At the current rate, it seems an email data breach is making headlines almost once a week. Whether it’s a nationally recognized retail store or a regional network of hospitals, sensitive information is being exposed as a result of these data breaches. To make matters worse, time tells us that this trend is on the rise. The Identity Theft Resource Center has tracked data breaches since 2005 involving compromised SSNs, credit/debit card numbers, email/password/username information and protected health information. Crunching the numbers, 5,029 data breaches occurred between 2005 and 2014...
Read More

Twitter Breach Reveals the Ease of Scraping and Sniffing

Wed, 04/29/2015 - 15:52 by Neil Farquharson
Wow! Hardly a day goes by when we don’t hear about another major breach. Yesterday evening it was the turn of Twitter. A leak of its trading results caused an 18% drop in its share value before the New York Stock Exchange halted trades in its stock. The data was gleaned from the internet using a technique called data scraping. With data scraping automated programs scour through data streams ignoring regular parsing rules and restructuring raw data so that it can be searched for usable information – that is, intelligence gathering. Data scraping is similar in methodology to packet...
Read More

Cybersecurity Risks: Is It All Hype?

Tue, 04/28/2015 - 10:31 by ZixCorp
Are we being overly paranoid when it comes to cybersecurity? If you pay any attention to the media, it seems like there is an increasing deluge of frightening stories about corporate data breaches with hackers accessing credit card numbers, private emails, Social Security numbers and a range of other sensitive information. It’s enough to make a company want to go back to life pre-Internet. At the end of the day, just how scared should we really be? Are most companies really at risk of having their data stolen and PCs hijacked by malware? Or is it mostly hype? Here’s the thing...
Read More

Is Your Security Failing?

Tue, 04/21/2015 - 10:51 by ZixCorp
Leaving email unsecured is one of the biggest risks an organization can take, yet many organizations continue to do this. Recently, people from both sides of the US political spectrum were surprised at “revelations” that Hillary Clinton and Jeb Bush exposed their business or government related emails by using privately owned email servers or a personally owned smartphone. While they are now apologetic, in retrospect, about doing this, they have what most people regard as credible reasons for doing so: and these reasons generally revolve around expediency and convenience. Like many...
Read More

Aligning Security Spending With Risk

Wed, 04/15/2015 - 08:40 by Neil Farquharson
I remember reading an article in CIO Magazine that claimed an auditor told Jason Spaltro, executive director of information security at Sony Pictures Entertainment, “If you were a bank, you’d be out of business.” The article, by Allan Holmes , was entitled Your Guide To Good-Enough Compliance. It sought to explain why CIOs and CISOs are so overwhelmed by the demands of their jobs that they did not have the time to invest in reconfiguring electronic systems and processes to meet regulatory requirements. In the article, Jason Spaltro of Sony was quoted as replying: “it...
Read More

Pages

Subscribe to RSS - data breach

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More