Posts Tagged ‘Data Security’

Protecting financial services industry data—from the inside

It’s often said that we are our own worst enemies. According to a Ponemon Institute report, employee or contractor negligence is the root cause of almost half of all data breaches. This is important to note in the financial services and insurancesector—where data breaches can be downright catastrophic. According to the report, the majority of [...]

Read the rest of this entry »

How did you learn to swim?

Hopefully you had a swim coach rather than a quick shove into the deep end of the pool. Just like learning how to swim, bridging the gap between what employees know about data security and what they do about it during the course of a normal day requires guidance. That guidance must be interesting and [...]

Read the rest of this entry »

Top 10 Benefits of Using a Single Platform for Transactions of All Types

Significant business benefits come with replacing outdated, disparate systems with a single platform that can handle all types of data transfer securely and reliably. First, the following benefits are associated with using a single platform for transferring both structured and unstructured data: Reduces risk, cuts operating costs, improves customer service, shortens time to market Speeds [...]

Read the rest of this entry »

How File Transfer Solutions are Like a Car

In a way, finding the perfect file transfer solution is like finding the perfect car. Like a Lamborghini, some technology is just way out of your budget. Like a Hyundai, some solutions (like email, Dropbox and FTP) seem amazing because they’re super inexpensive. Then there is the reliable BMW, that’s safe, intelligent and full of [...]

Read the rest of this entry »

Email and Data Security — Not a match made in heaven

Alas, some things just aren’t meant to be—Ashton and Demi, Michael Bolton and long hair, dogs and cats, email and sensitive corporate information. Yet most people today use email to send anything without even thinking about data security. The problem is that even though email seems way more advanced than licking a stamp and dropping [...]

Read the rest of this entry »

Now’s the time to secure your data, reputation and brand

The most important asset your company has is information—often highly confidential or proprietary information about your customers, business partners, employees, intellectual property, and more. We’re talking about employee social security numbers, banking and accounting information, and proprietary product information. Here’s the thing. Eighty percent of that information is kept in files, not the ERP systems [...]

Read the rest of this entry »

Banking software faces rising glitch rate and “tech debt”

As banks face a growing number of costly incidents, it begs the question, why? According to a recent BBC News article and our own experience—the answer lies somewhere between an overdependence on antiquated code, complex line-of-business and geographical variations, mass mergers and acquisitions, tighter SLAs and changes in data transfer patterns. Testing alone won’t be enough [...]

Read the rest of this entry »

New Forrester report provides key insight into data security today

Security and risk professionals get it. CIOs get it. CEOs get it. The potential costs that a loss of data can cause are staggering. News reports every year remind us of the clear-cut financial and reputation damage that data loss has caused some organizations. So we know the dangers — but what can we do? [...]

Read the rest of this entry »

SAPinsider covers eight great reasons to modernize B2B architecture

B2B integration architecture needs a makeover. When it comes to whether or not it meets the demands of a modern business, many are simply not passing the test. All too often businesses still rely on a veritable soup of integration technology—which is expensive and lacks features like SAP Enterprise Resource Planning (ERP). Furthermore, a recent [...]

Read the rest of this entry »

Does your SAP data need security from…you?

In a large organization, chances are there is more than one Rob Johnson, Bill Smith or Susan Hill working there. Whatever the case may be, sending files through SAP to the wrong Rob, Bill or Susan, is just one of the many ways data can get lost inside and outside a company. The fact of [...]

Read the rest of this entry »