Zix Blog

Upcoming Data Loss Prevention (DLP) Webinar: Solutions for Today’s Greatest Security Challenge

Tue, 07/29/2014 - 16:17 by ZixCorp
Every year, healthcare organizations, financial institutions, government agencies and businesses devote huge investments to prevent threats and boost compliance and security measures. Yet one salient fact remains: often the worst breaches and policy violations stem from human error — well-meaning employees who have no idea that they are putting patient records, credit card information and client identities at risk. Often, this data loss occurs through email, such as mentioning restricted information in outside correspondence or attaching documents that may violate customer or patient privacy...
Read More

What It’s Like When You Lose Your Device

Fri, 04/25/2014 - 16:39 by ZixCorp
We all know what it feels like to lose a smartphone. Even if it’s just misplaced for a few minutes, that sinking feeling in your gut is unmistakable. That feeling doubles when you realize your phone also contains sensitive corporate data and you might have to report it to IT. Oh no. Where is my phone? Image: Playbuzz ( http://www.playbuzz.com/scotto/do-you-know-your-internet-talk-or-are-you... ) Oh no oh no oh no oh no oh no…. Image: Hilarious GIFs ( http://www.hilariousgifs.com/ ) Okay, don’t freak out. It’s got to be around here somewhere. Image: Tumblr, gif reactions ( http://gifreactions...
Read More

Security Experts Provide Tips on How to Best Protect Personal Information from Heartbleed

Mon, 04/21/2014 - 14:11 by ZixCorp
As fallout from the Heartbleed bug continues to echo across the Web, people have been left with more questions than answers. Should you change all your passwords? When is it okay to change passwords? What websites are safe? How can you tell if your information was leaked? To help clear up confusion about Heartbleed, ZixCorp’s own Dave Robertson recently participated in a live chat on o.canada.com with security experts including Tyler Cohen Wood, cyber branch chief for the Defense Intelligence Agency, and Zhiqiang Lin, UT Dallas assistant professor of computer science and member of the Cyber...
Read More

Webinar Round-Up: Enhancing Your Data Protection with ZixDLP

Wed, 04/09/2014 - 14:47 by ZixCorp
Email is the number one app used in business communications and still the preferred method for sharing information and documents. As a result, it’s where a large amount of your company’s IP and sensitive information can be found – and where security policy violations occur. While malicious hackers or even hostile insiders can pose a security threat, loyal employees can also make mistakes that have the potential to lead to a security breach as they move information around in email and expose your organization to compliance violations, security issues…or worse. Since email continues to be the...
Read More

Enhanced Data Security Measures in the Legal Community: Q&A with Zix Expert Jim Brashear

Mon, 03/31/2014 - 17:20 by ZixCorp
Two recent New York Times articles sparked an interesting discussion in the legal community about data security measures at law firms. One article, Spying By N.S.A. Ally Entangled U.S. Law Firm , describes how government surveillance is capturing attorney-client email communications. The other article in Dealbook, Law Firms Are Pressed On Security for Data , describes how clients are demanding their lawyers step up their data security measures. Attorney data security is a topic near and dear to the heart of our General Counsel Jim Brashear. Jim has invested many hours writing articles,...
Read More

BYOD: A Fresh Perspective - Avoid a Bring-Your-Own-Disaster

Thu, 03/20/2014 - 20:26 by ZixCorp
Ready to jump on the BYOD bandwagon? Hold on, because it could be a bumpy ride. At first look, BYOD seems like an obvious choice for companies and their employees. Workers stay connected to office email and work applications anytime and anywhere on their favorite personal devices. Companies gain a happier, more productive workforce. Yet BYOD is a long way from nirvana. Companies are forced to walk on a tightrope between IT security and personal privacy. Done poorly, it has the potential to turn BYOD into Bring-Your-Own-Disaster . The disaster aspect can come into play when boundaries are...
Read More

Zix and Ponemon Institute Survey Reveals Demand for New, Cost-Effective BYOD Solutions That Meet Both Security and Privacy Needs

Tue, 11/19/2013 - 15:50 by RickSpurr
Bring-Your-Own-Device (BYOD) is here to stay. Companies are excited about the potential cost savings and added productivity. Employees are happy to use the personal devices they love and gain the flexibility of working away from the office. But before companies and their employees can enjoy all the benefits, significant hurdles lay in the way. So we partnered with Ponemon Institute to study the BYOD market and better understand the challenges companies face in taking advantage of this new phenomenon. In total, we surveyed 895 IT and IT security specialists primarily at supervisor level or...
Read More

ZixOne Use Case: Say Goodbye to an Employee, Say Goodbye to Your Data

Thu, 11/07/2013 - 16:26 by ZixCorp
A real-world example of the BYOD challenges companies face This use case came right from our own backyard. A new salesperson joined the Zix team recently. In explaining our new BYOD solution ZixOne , he pulled out his smartphone and shared a fun tidbit from his own life. At his last company, he was allowed to use his own device and connected to the company’s Exchange server through ActiveSync. Two weeks removed from his old job, he showed us how easily he could scroll through all the old emails stored on his device. Could you trust a former employee with customer data and pricelists? Are you...
Read More

Managing Access Is as Good as It Gets: BYOD Security without Compromise

Thu, 10/10/2013 - 15:31 by ZixCorp
If you’re responsible for managing BYOD, the recent stat that probably jumps out at you is that 113 smartphones are lost or stolen every minute. The odds are not in your favor. To make matters worse, when (not if) a device is lost or stolen, it may be hours, days or weeks before you even know it. In the meantime, your corporate data is in jeopardy. By the time you find out, the wrong person may have disconnected the device, prevented any wiping capability and accessed customer data, intellectual property and more. Save the worry and save the data by never allowing data to reside on the device...
Read More

Webinar Recap: Navigate the BYOD Movement with Expert Insight from InformationWeek and Zix

Fri, 10/04/2013 - 18:29 by ZixCorp
Recently we hosted a Webinar with Michael Finneran, author of InformationWeek ’s “2013 State of Mobile Security.” Below are five key takeaways form the Webinar. Looking for more? Check out the full Webinar and presentation here . 1.BYOD is Here, and So are the Risks. BYOD acceptance is approaching 90% of organizations, and many appear to allow personal devices without taking the necessary security precautions. According to Finneran’s report, 60% of devices accessing corporate data are company-supplied, and 40% are personally owned, with 100% of companies surveyed reporting experiencing a...
Read More

Pages

Subscribe to RSS - Data Loss

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More