Quantcast
Channel: Data Security – Intralinks Blog
Browsing all 28 articles
Browse latest View live

Securing Sensitive HR Information in the Enterprise

Having a secure solution to manage and protect sensitive HR data is critical to reducing the risk associated with the exchange of confidential information. The post Securing Sensitive HR Information in...

View Article



Controlling Content in the Digital Workplace 

The emergence of the digital workplace requires enterprises to think differently about content collaboration, protection and control. The post Controlling Content in the Digital Workplace  appeared...

View Article

The Data Sovereignty Dilemma of the Digital Workplace

If you are storing data in the cloud, be sure you can manage the storage location of the data to meet with data sovereignty requirements. The post The Data Sovereignty Dilemma of the Digital Workplace...

View Article

How can Businesses Evade the Ever Increasing Threat to their Data Security?

Intralinks' CTO EMEA, Richard Anstey, shares the state of corporate information security and best practices for data protection on Information Security Buzz. The post How can Businesses Evade the Ever...

View Article

The Challenges of Data Sovereignty in the Cloud

The concept of data sovereignty continues to evolve as do the laws, regulations and best practices for security and compliance. The post The Challenges of Data Sovereignty in the Cloud appeared first...

View Article


ISO 27001 Requirement for Providers: What You Need To Know

Here’s everything you need to know about what ISO 27001 security certification means to your organization and where its data is stored. The post ISO 27001 Requirement for Providers: What You Need To...

View Article

Did My Computer Security Predictions for 2015 Come True? Find Out Now…

Companies are suffering data breaches and zero-day vulnerabilities are being found. One important decision to make is how your business should share data. The post Did My Computer Security Predictions...

View Article

6 Practical Ways to Prepare for Your Next Compliance Exam

Regulatory exams are becoming more complex while preparation time is shrinking. So what's the best way to prepare thoroughly? Here are six practical tips. The post 6 Practical Ways to Prepare for Your...

View Article


5 Ways to Sleep Easy Knowing You Can Trust Your Company Data in the Cloud

Here are five data security tips to consider to help your information security and IT teams count sheep and sleep easy with your company data in the cloud. The post 5 Ways to Sleep Easy Knowing You Can...

View Article


Dropbox, Box vulnerable to Man-In-The-Cloud Attack

At last week’s annual Black Hat conference, the security firm Imperva said they’d found a 'side door' vulnerability in several file sync and share apps. The post Dropbox, Box vulnerable to...

View Article

U.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...

U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....

View Article

Information Rights Management (IRM): What It Is and Why You Need It

Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...

View Article

D’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches

While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...

View Article


Law Firms Are Not Immune to Hackers

As we saw from recent news, hacking law firms is not new. This begs the question: How should law firms detect a data breach or prevent one? The post Law Firms Are Not Immune to Hackers appeared first...

View Article

Becoming a Clinical Trial Investigator: Making Clinical Research Successful...

Dan Sfera, CEO of The Clinical Trials Guru, shares how to start your research clinic and how clinical research can be successful for all parties involved. The post Becoming a Clinical Trial...

View Article


Privacy Shield 101: U.S. Companies Face New Rules

If you’re a U.S. company doing business in Europe, what does the Privacy Shield mean for you? Here are the key points. The post Privacy Shield 101: U.S. Companies Face New Rules appeared first on...

View Article

U.S. Federal Trade Commission Gets Power to Sue Companies for Lax Information...

U.S. companies that fail to adequately protect their customers’ information due to lax information security can be sued by federal consumer-protection enforcers, based on a new ruling. The post U.S....

View Article


Top GP Concerns About Investor and Portfolio Company Communication, Security,...

A couple of weeks ago I had the opportunity to speak at the Capital Creation Conference in Monaco, hosted by Worldwide Business Research Limited. Three days spent overlooking the clear blue waters of...

View Article

D’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches

While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...

View Article

Fund Managers Speak Out: Investor Communication, Data Security, and Deal Flow...

Survey findings by Intralinks and Pitchbook reveals fund managers' views on investor communication, information security policies, and deal flow management. The post Fund Managers Speak Out: Investor...

View Article
Browsing all 28 articles
Browse latest View live




Latest Images