Insider Theft 2015: We’ve Been Warned

Identity Theft Resource Center (ITRC) is my go-to source for a running tally of breaches. As of last week ITRC, which gets its stats from media sources and state agencies, has counted 505 incidents, exposing over 139 million records. So a little after the mid-year mark, the number of records taken is ahead of 2014’s…

Continue Reading


Another Look at Folder Permissions: Beyond AGLP

AGLP is Microsoft’s four-letter abbreviation for guiding admins in setting permissions in an Active Directory environment. Account, Global, Local, Permission just means the following: you put user accounts (A) into global groups (G), put the global groups into domain local groups (L), and then grant permissions (P) to the domain local group. Makes sense, right?…

Continue Reading

law firms data security protection

Why Law Firms Should Care About Data Security

An alarming 70% of large firm attorneys do not know if their firm has been breached, according to a recent American Bar Association (ABA) survey conducted by the ABA’s Legal Technology Resource Center. For many companies, it often takes IT months to learn about an incident—if they ever find out at all—and usually only after…

Continue Reading


The IP Theft Puzzle, Part II: Ideas for Spotting Directory Copies

Catching an insider thief before he gets and exfiltrates IP ain’t easy. As I wrote about in the last post in this series, insiders already have access to sensitive content — they’re authorized to view, copy, and edit important code, documents, and presentations. Casing the Joint However, we do know that insiders generally first test…

Continue Reading


Say hello to the new is looking a bit different today… we’re excited to launch our new, redesigned website. And it’s all for you. We’re bringing you an updated site that’s clean, gets to the point, and lets you find what you need. We’ve updated our branding, simplified our messaging, and are bringing you an overall better web experience. …

Continue Reading

Gartner Includes DatAnywhere in its 2015 Magic Quadrant for Enterprise File Synchronization and Sharing

We are pleased to report that DatAnywhere, our secure file sync & share solution, has been chosen as one of only 16 products included in Gartner’s new 2015 Magic Quadrant for EFSS. After a little more than two years since it was first announced, DatAnywhere has gained enough traction with customers to be considered a…

Continue Reading


Her Majesty’s Five Essential Security Controls

The United Kingdom’s GCHQ, their NSA-like organization, has its 10 Steps to Cyber Security. We hear from our friends across the pond that it’s proven to be very popular. These tips from her Majesty’s security service point out general areas where organizations need to focus their security efforts. Are you now asking yourself whether there…

Continue Reading

The IP Theft Puzzle, Part I: Insider Entitlement

Earlier this year, the Metadata Era explored some of Carnegie Mellon University’s Computer Emergency Response Team’s (CMU CERT) research on insider threats. To refresh memories, CMU researchers found that motivations for insider actions roughly fell into three categories: financial, sabotage, and Intellectual Property or IP theft. The last one, IP theft, turns out to have…

Continue Reading


Will the EU’s Data Protection Regulation Apply to Me?

One of the more complex issues that will have to be resolved with the new Data Protection Regulation (DPR) is what’s being called “extraterritoriality.” As proposed by EU Parliament, the DPR will apply to any data transferred outside the EU zone. So under these new rules, if a US company collects data from EU citizens,…

Continue Reading


Protect Your Data: Top Ten “Need to Know” Tips

With breaches happening on an almost daily basis, it’s critical to establish rules and processes to keep your data safe and secure.  The following tips, designed to help you start on the path towards data security, were inspired by the FTC‘s great security advice to businesses. Don’t Make Security an Afterthought Think before you collect. …

Continue Reading