Blog | Cryptzone Insight

Almost Half of Organizations Have Suffered a Data Breach

Posted on Oct 1, 2014

Ponemon Institute and Experian Data Breach Resolution released findings last week from the second annual study “Is Your Company Ready for a Data Breach” that showed almost half of organizations surveyed have suffered at least one security incident involving the loss or theft of more than a 1,000 records, up 10% from 2013. As a [...]

Read More

Shell Shock Bug and Cryptzone Products

Posted on Sep 25, 2014

Many awoke this morning to news of the Shell Shock bug that poses a critical security risk to Unix and Linux systems.  According to Red Hat ‘this vulnerability CVE-2014-6271 could allow for arbitrary code execution. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.’ The good [...]

Read More

Will a written policy protect your data?

Posted on Sep 16, 2014

For many CIOs, faced with dwindling IT budgets and a growing number of network weakspots, it's become tempting to say no when employees propose schemes such as bring your own device (BYOD) or using personal cloud storage.   If a technology deployment represents a risk to enterprise security, or causes too much of an overhead for [...]

Read More

Better Together: Cryptzone and HiSoftware

Posted on Sep 5, 2014

If you read this morning’s newswires you may have seen that Cryptzone made a significant announcement. We acquired HiSoftware, a leading provider of governance, compliance and security solutions.  This is an exciting time for both companies as we unite, as well as for our rapidly growing customer base. HiSoftware’s product portfolio provides a highly complementary [...]

Read More

PoS breach epidemic continues with Goodwill stores

Posted on Aug 5, 2014

The point-of-sale (PoS) data breach seems to have become a staple of the IT security headlines recently. Though details on many of the more high-profile hacks remain scant, there tends to be a common pattern – cybercriminals breach corporate networks, install malware on PoS machines, such as cash registers and card scanners, and then spend [...]

Read More