Get DRM Security Insights

Recent Blog Posts

Big data drives importance of chief analytics officer position

October 19, 2012

The big data phenomenon is rapidly making its way into the private sector, forcing decision-makers to plan how they will manage, store and secure increasingly large volumes of information. This is contributing to the growing belief that chief analytics officer, or CAO, will be a necessary position in tomorrow's business world.

Read More

Cloud security concerns are ungrounded, expert says

October 18, 2012

Cloud computing is seeing adoption throughout the private sector, as companies continue to embrace the technology as a way to host mission-critical documents and resources off-site. Despite the proliferation of cloud services, many decision-makers are still skeptical about the cloud's ability to keep sensitive assets protected. Considering the current state of cloud systems, however, this[...]

Read More

Advanced security tools may minimize data breach risks

October 18, 2012

Although protecting mission-critical resources is extremely important in today's business world, such strategies often cost companies a lot of money, which can be devastating during the ongoing economic crisis. A recent study by the Ponemon Institute, which said document rights management and encryption tools may help firms stay secure, highlighted this, according to Dark Reading.

Read More

SMBs need security help

October 17, 2012

As the private sector continues to adopt a paperless work style, decision-makers need to leverage document protection tools capable of keeping mission-critical resources safe. Unfortunately, a new study by the National Cyber Security Alliance and Symantec revealed that many small and medium-sized businesses have a false sense of security.

Read More

SMBs need to prioritize security in the cloud

October 17, 2012

Companies around the world are leveraging cloud computing services to make mission-critical resources more accessible to users, regardless of location. While enterprises are embracing the cloud at full speed, small and medium-sized businesses are a little more hesitant, as they are not as confident in the cloud's document protection capabilities, according to a report by MYOB.

Read More

SMBs, enterprises experience same security issues

October 16, 2012

Small and medium-sized businesses face the same digital vulnerabilities as enterprises. Since small firms don't have the same budgets as their larger counterparts, however, SMBs are often more susceptible to exposing sensitive resources. For this reason, decision-makers need to be extra diligent, according to a report by Dark Reading.

Read More

Canadian small businesses need help with security, study says

October 16, 2012

Small businesses are an essential part of the recovering economy. Regrettably, many smaller firms do not place enough emphasis on document protection programs, leaving mission-critical resources at the mercy of unauthorized individuals.

Read More

Protecting documents means changing default security settings

October 15, 2012

Since companies are becoming increasingly responsible for managing vast quantities of sensitive data and documents, decision-makers are leveraging advanced databases for storage. Unfortunately, many organizations do not take proper precautions when using these storage environments, according to a report by Dark Reading.

Read More

Trust-based security strategies can keep sensitive documents safe

October 15, 2012

An effective document protection strategy requires diligence and an educated workforce, especially as organizations use electronic records rather than traditional physical paperwork. A recent report by CRN said decision-makers need a layered security model to ensure mission-critical and confidential resources remain safe.

Read More

Experts say businesses must narrow security perception, reality gap

October 12, 2012

In a keynote at the recent RSA Conference London 2012, security experts Art Coviello and Tom Heiser said many companies take an antiquated approach to document protection, leaving sensitive assets unguarded and vulnerable. This is becoming increasingly dangerous in today's highly digital landscape where the majority of documents are in electronic form.

Read More

Cloud introduces new document protection challenges

October 11, 2012

Technological advances have made it possible for organizations to leverage electronic documents more efficiently, though not all decision-makers are implementing appropriate levels of security. A new study by the Ponemon Institute and Informatica noted that U.K. firms, in particular, are experiencing data breaches because they don't have the ability to monitor who has access to sensitive[...]

Read More

Document protection importance grows with content explosion

October 11, 2012

The term "document" in the private sector used to be equivalent to a piece of paper with or without sensitive information printed on it. Today, however, the document has transformed to include a number of media types, including video, audio and electronic PDFs. As the number of these files created in the workplace continues to grow, the need to implement robust security solutions is becoming[...]

Read More

Document security plans should keep budget in mind

October 10, 2012

In today's highly complex and technical business world, determining which files and resources are the most sensitive is the first step in implementing a hardy document protection plan, according to a report by Dark Reading. Decision-makers need to understand how these solutions are used and accessed by employees in the workplace.

Read More

Healthcare encryption is a must

October 10, 2012

Healthcare organizations are responsible for maintaining highly sensitive information that can harm an individual's financial stability if exposed. Since physicians and other employees at these providers need to collaborate with one another, however, decision-makers can't simply lock up sensitive resources. Instead, decision-makers need to ensure they implement robust document protection tools[...]

Read More

Top-down security approach begins with new mindset

October 09, 2012

If companies hope to keep sensitive records out of the hands of malicious individuals, decision-makers need to implement a multi-tiered document protection strategy. Unfortunately, not many business executives are empowering employees with the tools and knowledge required in a security-focused workplace, according to a report by TechTarget.

Read More

Healthcare risk assessments can enhance document security

October 09, 2012

Security risk assessments are essential to ensuring a company's document protection tools can keep sensitive resources away from unauthorized individuals. These evaluations are especially important in the healthcare industry, as the Health Insurance Portability and Accountability Act require them so facilities can effectively reduce their overall risk, according to a report by PhysBizTech.

Read More

Threat management need not be complex

October 08, 2012

Implementing a robust document protection program is a lot like driving a car, as they both require a number of moving parts to work together seamlessly if decision-makers are to get anywhere. Recently, threat prevention has become one of the most important security initiatives in the private sector, especially as organizations adopt cloud computing and other next-generation technologies and[...]

Read More

Multi-factor authentication flourishes

October 08, 2012

Identity and access management technologies and strategies are becoming increasingly important in today's business world as companies are forced to adopt processes that incorporate efficient document protection tools for a growing number of sensitive resources. While traditional methods for authenticating a person's identity can still be effective, the evolving digital landscape often requires[...]

Read More

Zero trust identity and access management keeps documents safe

October 05, 2012

The rapid proliferation of cloud computing and mobile devices has introduced a number of new challenges for organizations today. Decision-makers are forced to adopt identity and access management processes to ensure their document protection tools are capable of keeping sensitive assets safe. Unfortunately, many old approaches to IAM are making companies more vulnerable rather than secure,[...]

Read More

Incident response plans enhance healthcare document protection

October 04, 2012

An incident response plan is a vital part of any healthcare organization's document protection program, as these facilities are often responsible for highly sensitive records. While most states require hospitals and other healthcare firms to deploy some form of incident response plan (IRP), there is no one-size-fits-all approach, as each agency has its own unique requirements, according to a[...]

Read More