Federal Government Prioritizes Data Security

Tuesday, May 7, 2013 Posted by

During the last State of the Union address, President Barack Obama included improving data security on his list of national priorities.

President Obama said, “America must also face the rapidly growing threat from cyberattacks… We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our economy.”

Including data security 0n the President’s agenda is significant because it first implies that our government is not yet accomplishing this goal, and second it compels us to put the pieces in place “to protect our national security, our jobs, and our privacy.”

Cyberattacks Not Always Sophisticated

Government Data Security Identified as Top PriorityWhile the list of companies who have suffered some form of data breach grows, the sad reality is that many cyberattacks (malicious or otherwise) are not “sophisticated” and could be prevented with off-the-shelf solutions. These first level attacks focus on corporate secrets, personal identity fraud, credit information, and private email.

The second level of attacks are those that attempt to disrupt our national security, financial institutions, and the backbone of our infrastructure. Internet providers, utility and transportation companies use communications to run switching stations, trucks, and trains, all of which would affect our livelihood if disrupted.

The President mentioned signing an Executive Order to work on this initiative (Executive Order 13636—Improving Critical Infrastructure Cybersecurity). The Executive Order calls for standards, processes and procedures to be proposed within 120 days of its signing (February 19, 2013).

Don’t Wait to Take Action

When trying to comply with all of the various data security regulations (like  PCI DSS or HIPAA), it is critical to have the right procedures and products in place.

A variety of government agencies have already implemented solutions such as the GoAnywhere managed file transfer solution.  GoAnywhere takes a standards-based approach to data security using proven FIPS 140-2 validated encryption, SSL, TLS and SSH protocols, along with role-based administration and detailed audit trails.  This comprehensive approach allows federal agencies to protect and automate their batch transmissions, perform ad-hoc transfers safely and provide a compliant alternative to email attachments.

Linoma Software will be demonstrating the GoAnywhere solution, which is now listed in the GSA Advantage Directory, at the upcoming FOSE Government Technology and IT Expo held in Washington DC, May 14-16.

In the State of the Union Address, the President encouraged Congress to pass laws to “give our government a greater capacity to secure our networks and deter attacks.”

Take a look at GoAnywhere today and learn how you can meet your security requirements and save costs through file transfer automation.

 

Healthcare Industry Still Lags in Protecting Data

Tuesday, April 30, 2013 Posted by

As healthcare information security requirements and penalties get tougher, a great deal of discussion is focused around how well the healthcare industry is securing patient data.

healthcare data security survey resultsThe general consensus is that the industry still has a long way to go. One of the industry’s publications, Healthcare InfoSecurity, released the results of the Healthcare Information Security Today survey sponsored by RSA which took an in-depth look at security and IT practices of senior executives in the healthcare industry.

<< click on the image to learn more

 

The survey reviews many information security topics including

  • Impact of a data breach
  • Security threats
  • Compliance and steps to improve security
  • Risk assessment

Some of the responses surprised us on how far healthcare companies need to go for proper HIPAA compliance. Take a look at these statistics:

  • 55% of respondents were not confident in their organization’s ability to comply with HIPAA and HITECH Act regulations concerning privacy and security (grading themselves adequate or less).
  • 66% responded that their organization’s ability to counter internal information security threats was adequate or less.
  • Only 47% of survey participants utilize encryption for information accessible via a virtual private network or portal.
  • 32% of respondents have not conducted a detailed information technology security risk assessment/analysis within the past year with 47% updating their risk assessment only periodically.

The good news is that the survey shows that healthcare organizations are taking steps in the right direction to improve their security practices.

  • 37% of organizations’ budgets for information security are scheduled to increase over the next year.
  • 40% of respondents plan to implement audit tool or a log management solution within the next year.

When asked what their organization’s top three information security priorities are for the coming year, the top responses included

  • Improving regulatory compliance efforts
  • Improving security awareness/education
  • Preventing and detecting breaches

Healthcare IT teams will need updated security policies, comprehensive training for employees, and reliable tools and solutions that can deliver functionality, ease of use, audit reporting, and efficient workflows that protect the security of confidential data at rest and in motion.

The pressure is growing, compliance audits are looming, and tackling these issues are just part of the evolution of the healthcare industry.

 

Linoma Joins HANDD at InfoSecurity Europe

Wednesday, April 24, 2013 Posted by

Following on the heels of the InfoSec Conference in Orlando last week, we’ve crossed the pond to co-sponsor an exhibition stand with longtime partners HANDD Business Solutions at the InfoSecurity Europe conference in London.  This event brings experts from all areas of cyber, network, cloud and data security together to discuss key issues and educate IT professionals on best practices.

InfoSecurity EuropeNo matter where an organization does business, keeping private data protected, avoiding data breach, and implementing appropriate policies and procedures to meet a variety of compliance guidelines are formidable challenges.

On the top of the minds of IT professionals who stopped by our stand, #C95, was how to find a better file sharing alternative than the free cloud-based services that have become popular with employees, but that are virtually impossible to monitor and track to meet compliance guidelines.

Read HANDD’s blog post to hear more about the first day at InfoSec Europe.  You might also check out this informative infographic that HANDD developed entitled “Dropbox vs Secure Managed File Transfer” to examine the challenges of cloud file storage options.

 

 

GoAnywhere.com has a whole new look!

Monday, April 8, 2013 Posted by

While some of our team is enjoying the COMMON Users Group conference in Austin this week, we’re excited to announce that we’ve completely revamped our website at GoAnywhere.com to make it even easier for visitors to find what they need.

It’s now easy to search by solution, by product, or by industry, and quick access to videos and other resources makes researching much quicker.

GoAnywhere.com website design

GoAnywhere.com internal website page

Whether you’re discovering GoAnywhere for the first time, or are a happy customer, we hope you’ll check out our new website, and let us know what you think!

Hold the Phone! Your Cloud-Storage Files May Be Vulnerable

Friday, March 22, 2013 Posted by

The cloud storage services market has seen tremendous growth in just the last two years. Reports indicate a growth from 300 million cloud storage subscriptions in 2011 to over 500 million in 2012. The popularity and convenience of mobile devices have fueled this growth, with cloud services presenting a way for companies and their employees to share files anytime and from anywhere.

dangers of mobile file transfers in the cloudThe ability to access virtually any type of document from your smartphone has been both a great tool, and a potentially serious risk.   Sharing files in the cloud allows your traveling sales representatives to access their latest sales report from their tablet, and lets the exec review accounting figures from their phones. Once the files are viewed, the users can delete them and assume everything is safe.

While cloud storage services may be convenient, they also present many security vulnerabilities. One of those vulnerabilities is that unauthorized users may be able to gain access to your files stored in the cloud through your mobile phones.

A recent article published in InfoWorld details the findings of a new report that focused on the security risks of using cloud storage services like Dropbox, Box and SugarSync. It described how researchers were able to recover a variety of different files from multiple mobile devices including iPhones and Android devices, even after they had been deleted from the cloud.  In addition, data about the cloud service user was also accessible via the phones.

Given how many mobile devices are lost and stolen every day, if you or your employees use a cloud storage solution to transfer sensitive data, it’s possible that someone with the right expertise could access those files using your mobile device.

Two important precautions companies can take to minimize risk are to train employees to follow established security policies, and give them easy access to a secure and convenient way to share and store files.

Secure managed file transfer solutions are an excellent alternative to the cloud storage services, providing the ability to transfer files – both batch and ad-hoc — without risk of unauthorized access. It puts the control for data security back into the hands of the IT team without compromising the workflow for employees.

Managed file transfer solutions offer many features not typically included in cloud based storage solutions like encrypted file transfer protocols, error reporting, audit trails, and support for SFTP, FTPS, and HTTPS – all important to maintain the utmost level of security.