Zip first, sync second

By

    Well at least that’s nCrypted Cloud’s motto. There is really very little reason these days not to encrypt your data. Long gone are the days when encryption techniques would slow down your machine, or cost an arm and a leg. Instead, encryption technology has become both fast and reliable, and will prevent you from becoming an OCR headline. What is the OCR? The Department of Health and Human Services’ Office for Civil Rights. They are the ones who police HIPAA violations, handing out fines for repeated offenders. Earlier this month, the OCR announced that it has resolved two… Read more ›

Zip first, sync second

By

    Well at least that’s nCrypted Cloud’s motto. There is really very little reason these days not to encrypt your data. Long gone are the days when encryption techniques would slow down your machine, or cost an arm and a leg. Instead, encryption technology has become both fast and reliable, and will prevent you from becoming an OCR headline. What is the OCR? The Department of Health and Human Services’ Office for Civil Rights. They are the ones who police HIPAA violations, handing out fines for repeated offenders. Earlier this month, the OCR announced that it has resolved two… Read more ›

The gateway to secure collaboration

By

In todays landscape, with the continuum of high profile breach events and NSA revelations, it’s no surprise that IT security budgets are increasing (up 17% in 2013, with 45% of firms planning to increase even further in 2014), but what is all that extra money going towards? One of the chief complaints from Security and Risk professionals is having to wade through the mass of security companies popping up recently. Protecting company data is already no small task, but combined with not knowing which direction to turn to, sets the stage for disaster. This is why Forrester has created its… Read more ›

Heartbleed OpenSSL Bug

By

We at nCrypted Cloud are obviously very concerned with the revelations about the catastrophic Heartbleed OpenSSL bug earlier this week. We just want to give all our users an update as to the security status of our website, which has not been effected by the bug. If you need to check the status of your web site, you can test your vulnerability here. In the words of famous security expert Bruce Schneier, “On a scale of 1 -10, this is an 11.” Schneier says that half a million sites are vulnerable to this bug. It is of vital importance to… Read more ›

Security Tip of the Week!

By

Not All Data is Created Equal    In the ever increasing world of cyber crime not all data is created equal, and thus, not all data should be stored the same. Data that can be converted into currency in any way is what hackers are after; we call this toxic data. According to a Forrester article, “Attackers won’t steal data they can’t sell in the market for stolen data like credit cards, credit reports, certain types of IP, and personally identifiable data.” But don’t be fooled by what people tell you is not important data, because often times it can be.… Read more ›

Top 3 Security Threats of 2014

By

     1. BYOD Trends In The Workplace We can’t ignore it anymore; the BYOD trend is booming and cannot be stopped.  Employees in 2014 seem to like using their own customized personal device, which makes sense because it’s easier to use and increases productivity as well as efficiency. A lot of employees don’t know it yet but bringing their own mobile devices into the workplace causes a lot of issues with the risk of data breaches and being exploited. The risk associated with bringing in a device varies and is explained well by Steve Durbin of Computer Weekly stating, “These… Read more ›

With 30 Million Healthcare Records Lost, What’s the #1 Cause?

By

With more than 30 million individuals having been affected since 2009, healthcare data breaches are swiftly becoming one of the more costly expenses to healthcare organizations everywhere. If you would like to take a look at the highlights, just visit the Department of Health and Human Services’ Office for Civil Rights “wall of shame”, for a list of every breach affecting more than 500 people. The current tally is just over 900. Not surprisingly, the most common cause of breaches listed on the wall is from lost or stolen unencrypted devices. According to Dan Berger, security expert at the pen… Read more ›

Wealth And Innovation Beware

By

“Their impact is tremendous, in the hundreds of millions of dollars from small business, mom and pop operations, who lose their very existence to a financial crime.” Don Johnson, Associated Press. International cyber crime organizations targeting well to do enterprises are on the rise in the United States. Specifically, cyber gangs seem to be targeting California businesses and financial institutions. A report made by Attorney General Kamala Harris says, “California is a global leader on a number of fronts and, unfortunately, transitional criminal activity is one of them.” Experts think that the up rise in cyber crime in California is… Read more ›

A New Hope for Privacy?

By

Since 911, Americans have born witness to the slow, but steady decline of their privacy, all in the name of safety and security. The worst was surely all of the revelations about the NSA, the latest being the fact that they really are recording all of your VoIP and phone conversations and storing them in bulk. One can only imagine what would is going to come next. So it was with a feeling of being able to breathe a bit easier that I stumbled upon Calyx.   Calyx is non-profit based out of New York, who’s mission is to “educate… Read more ›

The Internet of Perils

By

    Imagine a world where you walk up to the front door of your house or apartment, speak into your watch and the door unlocks. You walk inside, put your coat on the rack and walk into the kitchen and say “Ok Google, it’s a little cold in here, raise the temperature to 72 please, and put the kettle on and set the oven to 375.” At that same moment your wearable device uses your heartbeat along with skin-sensing technology to determine that you are tired and a little irritated, so it starts playing your favorite relaxing piano concerto… Read more ›