Security Tip of the Week!

By

Here at nCryptedCloud we are all about privacy. Because of that we would like to offer a security tip of the week to help people keep their computers and data secure! Tip #1: Firewall Protection The first step to making sure your data is secure it is to make sure your firewall settings are turned on. If you would like to share folders locally make sure your firewall is set for “home network” and not “public.” If you don’t wish to share anything disable file and media sharing completely. This may seem obvious but according to a Microsoft study nearly 26%… Read more ›

Security Tip of the Week!

By

Here at nCryptedCloud we are all about privacy. Because of that we would like to offer a security tip of the week to help people keep their computers and data secure! Tip #1: Firewall Protection The first step to making sure your data is secure it is to make sure your firewall settings are turned on. If you would like to share folders locally make sure your firewall is set for “home network” and not “public.” If you don’t wish to share anything disable file and media sharing completely. This may seem obvious but according to a Microsoft study nearly 26%… Read more ›

A New World for Small Business

By

Take a minute and ask yourself, where would your small business be today without the cloud? Luckily for everyone, the age of USB sticks, compatibility issues, and sky high energy costs is, for the most part over. We live in an age where we strive to own fewer things that are capable of performing the most possible tasks. 2014 will continue to bring into focus the cloud-computing trend, focusing not only on larger organizations, but smaller businesses as well. Cloud Computing, what is it? According to SmartBrief Media[i], cloud computing is “the use of a network of remote Web-based servers,… Read more ›

How Healthcare Can Tackle the HIPAA/HITECH Pandemic

By

Health Care Information Sharing and BYOD Clinicians use multiple devices daily to file, share, and store information. Since personal health care information is so confidential it is constantly at risk for theft. Data theft has been rising since many clinicians bring and use their own devices to access and store personal health information. Healthcare administration is trying to figure out a way to allow the use of these devices but need to keep them compliant with HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) however, this is proving to be… Read more ›

In the New World of Data Mining, What’s your Worth?

By

Data Collection The world of technology is constantly growing and changing. More and more people are storing their lives online everyday. Whether it is Facebook, shopping online with a credit card, emailing a client, or storing information in the cloud, this way of accessing and storing data is not secure. It may make life a bit more convenient, but ultimately it puts you at risk for data theft. The National Security Agency (NSA) has been storing the public’s information without their knowledge for years and, with the help of Edward Snowden releasing confidential documents, has had a lead role in… Read more ›

In 2014, IT Gets Serious About BYOD

By

In a recent article titled 12 Big BYOD Predictions for 2014, CIO magazine discusses how IT will “Strike Back” this year by implementing serious network and system changes to insulate them from “gaping” BYOD related risks. Encrypt Before You Sync According to Forrester, over three-quarters of business decision-makers identify mobile strategy as a moderate, high, or critical priority. And, since the vast majority of mobile users are taking advantage of cloud based, share and sync technologies, it would only make sense to emphasize the need to encrypt data on endpoints, before it hits cloud service provider data centers. Assume the Best,… Read more ›

29 Million Reasons to Encrypt Your Data

By

Without fail, every time my dad can’t find his cell phone, he starts pacing up and down the hall panicked, yelling at me to “Call it!” in a thick English accent. It also doesn’t help that he is partly deaf in his right ear, and probably couldn’t find it if it was ringing 5 feet from his head. So, I inevitably find myself walking around the house trying to find his cell phone, with mine own in hand. But, since my father has been in management consulting for 26 years, like many professions in this day and age, his cell… Read more ›

For CISOs, It’s Grow or Go

By

In the Information Security world, the one thing that people agree on is the need for change. It is an indispensable thread that weaves throughout every corner of the industry, and defines it. Change Makes You stronger Like many industries, without change there can be no growth. But when it comes to information security, without the constant evolution of the critical policy makers, the main body of security professionals will be unable to rise to the trials and low spots they are sure to face. Call to Action Since mid 2013, S&R professionals have been enjoying what has been dubbed,… Read more ›

If It’s Personal, It’s Toxic

By

  In the cat and mouse world of information security, data equals money. The only question is, for whom? Here is a quick rundown of who is looking to steal your data, and what kind, as well as a few guidelines that can help you fight back.  Toxic Data, what is It? Any Personal Identifiable Information (PII), Personal Health Information (PHI), or HIPAA Data. This means everything from your first and last name, to your latest hospital or doctor report. Toxic Data can also include Intellectual Property (IP), Payment Card Information (PCI) and sensitive corporate documents. Simply stated: If it’s… Read more ›

Happy 2014!

By

nCrypted Cloud would like to wish you a Happy New Year!  We would also like to take this time to thank all of our users for their continued support and feedback! nCrypted Cloud has come a long way and we could not have done it without you! We are thrilled to start the new year off strong! Here’s to 2014!