Email: The Bane and Boon of Modern Communication

Recently, we conducted a survey on digital work habits, specifically around email and its ubiquitous (and overwhelming) role in business communication. The survey results were eye-opening to stay the least. We found that a constantly increasing volume of emails are forcing knowledge workers to allocate significant time and effort to managing their inboxes. Moreover, we…

Continue Reading

Data Stewardship in 13 Minutes a Week

Andrew White, Research VP at Gartner, has a great thesis on data stewardship: “13 minutes a week – that is how much work your data stewards should be doing.” That is, in order for data stewardship (or data ownership) to be truly adopted by the business—marketing, HR, finance—the work we require them to do should…

Continue Reading

Using Varonis: Involving Data Owners – Part II

(This is one entry in a series of posts about the Varonis Operational Plan – a clear path to data governance.  You can find the whole series here.) If your doctor said “Your blood pressure is 120/95” would that mean anything to you?  Even if you could interpret that data as symptomatic of stage 1 high…

Continue Reading

Clash of Compliance Cultures: Old vs. New World

In the last few years, US companies have not been shy about expressing their feelings on the EU’s Data Protection Directive (DPD). There’s a major social media player, for example, with a European HQ in Ireland that’s been publicly critical of a proposed “right to be forgotten” rule for letting consumers delete their online data….

Continue Reading

Is DNA Really Personally Identifiable Information (PII)? No. Maybe? Yes!

Biometric data is at the limits of what current personal data privacy laws consider worthy of protection. This type of identifier covers fingerprints, voiceprints, and facial images. While the risk factors are not nearly as threatening to consumers as more traditional PII, they do exist. Until recently, the dangers of biometric identification using DNA were…

Continue Reading

HIPAA’s New Rules Reach Far Beyond Healthcare Providers – Are You Impacted?

Two weeks ago, the Department of Health and Human Services (HHS) issued final regulatory rules that place a new group of data processors and third-party consultants directly under HIPAA’s data security compliance regulations. Some Background In 2010, HHS issued a “notice of proposed rulemaking”, seeking comments from stakeholders as it worked out updated regulations for…

Continue Reading

Report: Nearly Half of IT Staff Fear Unauthorized Access To Virtual Servers

There are reportedly over 50 million VMs residing on servers.  Varonis surveyed IT staff at VMWorld San Francisco and VMWorld Barcelona in 2012 to answer questions about VM adoption, saturation, use cases, deployment, security and more. Virtualization yields countless benefits.  Our results show that 76% of respondents use VMs for fast deployment, 74% cite disaster…

Continue Reading

Determining the Root Cause of a Data Breach With “The 5 Whys”

The jarring sound of an iPhone vibrating against a mahogany nightstand at 3:15am.  This can’t be good.  Server down?  Much worse: 50,000 sensitive files have been stolen from a poorly permissioned file server.  First, damage control.  Next, investigation. Problem: 50,000 files were stolen. Why?  The files were accessible to everyone in the company, even guests….

Continue Reading

The ECPA Puts Your Cloud Data at Risk

Today we live in a highly collaborative environment.  People expect to be able to collaborate wherever they are – on the couch with their iPad, in the office, or on a smartphone at 30,000 feet.  As a result, we have seen cloud based file-sharing explode over the last few years.  The promise, of course, is…

Continue Reading

BYOD (Bring Your Own Device) Workplace Survey. Win the new iPad mini.

Workplaces across the globe are letting employees bring their own devices to work, allowing them to access sensitive company data from personal hardware. At Varonis, we’re always striving to keep up with the very latest trends in BYOD and workplace collaboration, and how they impact IT. What better way to learn the latest on BYOD…

Continue Reading