When your company has multiple teams working in Slack, sending each other files, collaborating on projects, and communicating across channels, it can be hard to keep track of exactly what information is being shared and how. There’s no doubt that Slack does wonders for your business’ productivity and efficiency and makes it particularly easy to share data—but you should also expect it to maintain a secure work environment. We’ve outlined Slack security basics and ways in which Sookasa can help encrypt files in Slack; another major element of a secure workplace is data loss prevention. Here’s a primer on how Sookasa can help maintain Slack data loss prevention.Read more »
Category: Best Practices
In many ways, Google Drive is an immensely useful tool: it lets you store all of your files in a single place that you can then access from anywhere and from any device. It also makes sharing files and folders with team members or collaborators essentially seamless. But the ease with which Google makes your files accessible to you may also be a major drawback. Because you’re always logged in to Google both on your computer and your phone, it can be easy for someone else to access your Google Drive files if you lose one of your devices or leave it unattended. It’s easy to imagine how that could prove disastrous if you’re using Google Drive to store sensitive client or patient information, financial data, your company’s trade secrets, or any other confidential information. There are, however, a few ways to bolster Google Drive’s security by enhancing password protection. Additionally, deploying Sookasa for Google Drive also provides a secure and simple solution to encrypt your Google Drive files, enforce two-factor authentication, and maintain other privacy controls.Read more »
Over the last couple of years, Cloud Access Security Brokers (CASBs) have burst on the scene as a way of controlling organizations’ data and maintaining security in the cloud. As more and more companies move to the cloud, adopt BYOD policies, and contend with their employees’ use of file sync-and-share applications (whether company-sanctioned or not), CASBs have become increasingly important in managing the proliferation of information.Read more »
In our time building security solutions for consumers, small-to-medium businesses, and enterprises, one of the things we’ve found most striking is the difference in mindset among these types of organizations.
You might see it when reading between the lines every time there’s a new data breach in the news. The message? Even with a security budget that can fund a small country, there are enterprises out there who don’t take security seriously because they’ve deemed it cheaper for them to deal with a breach than to spend money on the infrastructure to prevent it.Read more »
If you’re like us, you might have been tempted to roll your eyes when you read the Office of Personnel Management’s post-mortem on its enormous breach last summer, which said that it had so much trouble controlling its data because employees simply couldn’t keep track of it all. It turns out that an incomplete inventory of all of OPM’s servers, databases, and network devices—let alone the files stored there—led to the drastically diminished effectiveness of the organization’s security measures. It also led to the breach of 22 million people’s records. It’s unacceptable. But let’s face it: This problem isn’t unique to OPM, and the cloud is only exacerbating these visibility problems. Organizations are migrating their businesses to the cloud, but there seems to be an increasing level of panic over the current state of affairs. There are some things savvy security professionals must keep in mind to prevent this problem from getting out of control. Here are a few of these security tips.Read more »