A Spotlight on Security | Nov 15, '22

A Spotlight on Security | Nov 15, '22

During busy workweeks, Spotlight on Security aims to keep professionals updated on security issues. This newsletter features critical industry topics, trends, and news.

Dear Subscriber,

In today’s biweekly newsletter, you will find:

  • Tresorit Insights ??
  • Word of the Fortnight???
  • Knowledge Hub??
  • Meme of the Fortnight???

Tresorit Insights ??

As tech regulation continues to evolve, businesses rely on data analytics to:

?? Meet data protection compliance requirements

??? Customize products to build customer trust

??? Grow revenue

But have you ever wondered what happens to your data once you’ve shared it?

In many cases, consumer data is shared with numerous departments in the same company, where employees can lose control over what happens next. The more channels which share data, the greater the chance of a data breach. Individuals rarely go out to violate privacy law — but accidental mishandling can easily leads to unauthorized data access.

More and more consumers are concerned about data transfers, and this has a significant impact on their buying behavior. Research shows that:

??40% of customers stopped doing business with a company that was not protective of customer data,

??87% of respondents said whether a company was ethical and had a trusted reputation was important to their buying decision.

In our upcoming blog, we’ll cover you can take control of your data, and how companies can improve their security by implementing privacy by design. ?

Until then, check out some more of our posts on the same topic:

Industry News Snippets ???

Cybersecurity and Encryption News

As the Signal protocol becomes the industry standard, it's worth understanding what sets it apart from other forms of end-to-end encrypted messaging.

From skills shortages to cybersecurity threats and 'the Frankencloud', companies who have invested heavily in the cloud in 2022 face challenges in the year ahead.

The U.K.’s National Cyber Security Centre has launched a new program that will continually scan every internet-connected device hosted in the United Kingdom for vulnerabilities to help the government respond to zero-day threats.

Data protection and regulation: new legislation frameworks approaching on the horizon

A multi-year investigation into TechCrunch’s parent entity Yahoo — looking at compliance with key transparency requirements of the European Union’s General Data Protection Regulation (GDPR), including in relation to cookie banners displayed on its media properties — has taken a step forward today after Ireland’s Data Protection Commission (DPC) announced that it has submitted a draft decision to other EU data protection agencies for review.

Word of the Fortnight ??

G for Governance

No alt text provided for this image
source: SketchBubble.com

Knowledge Hub ??

The growing need for robust user governance capabilities when working in the cloud, especially for larger businesses, comes down to multiple factors:

  • An increase in cyber attacks
  • Human error as a facilitator of data breaches
  • The complexity of data protection regulations

But how can we overcome the challenges?

?? Use a content collaboration platform with functionalities that suit different departmental needs

?? Ideally, use some kind of centralized monitoring dashboard or interface, which allows administrators to track down the source of cybersecurity events

?? Use a central directory that defines which tools each user can access. This list of tools should include the company’s inter-departmental content collaboration platform.

?When possible, use a content collaboration platform that allows you to establish policies for specific user groups.

Discover our data protection-related content here.

Tresorit Feature: Admin Center

Admin Center

Tresorit team subscriptions are equipped with an admin center, where you can manage users, central billing, policies, and custom branding. It is available to admins on business, business plus, and enterprise plans.

To access your admin center, head to web access and switch view.

No alt text provided for this image
The Tresorit Admin Center

The feature allows admins to:

? Make 2-Step verification a requirement

?? Define permitted devices

?? Set IP filtering and session control

?? Disable sharing with link as well as automatic sign-in and shared contacts

?? Disable tresor creation, sharing or synchronization

?? Disable permanent deletion

?? Limit tresor sharing to subscription users

?? Limit access to allowed viewers only

In a nutshell, the admin center is a feature designed to help you keep track of what’s happening in your company subscription.

You can use it to monitor device and user statistics, define security policies, and customize the design of your Tresorit workspace with brand visuals.

Meme of the Fortnight???

This is the way...

No alt text provided for this image
source: Balbix.com

Have a great week, and thank you for reading us!

About us

Tresorit?is a Swiss-Hungarian, end-to-end encrypted, zero-knowledge content collaboration platform designed to safeguard the digital valuables of individuals and organizations with the highest classification in the cloud.

Tresorit for Business: Encrypted Cloud Storage for Businesses

要查看或添加评论,请登录

Tresorit的更多文章

社区洞察

其他会员也浏览了