Blog

Gartner Security and Risk Management Summit 2016

This past week, June 13-15, members of the CENTRI team went to the Gartner Security and Risk Management Summit 2016 event in National Harbor, MD. By all accounts, it was a successful conference full of opportunities to meet others in the data security and protection industry, learn about the current state of the industry, and … Continue reading Gartner Security and Risk Management Summit 2016

Read More

Protect Your Valuable Asset: Your Data

In the world of paper and coin, if I want to protect my valuables – things like stock certificates, my grandfather’s watch, etc., I would put them in a safe deposit box at the bank. Of course, there are numerous other options: under the mattress, in the breadbox, in a coffee can buried in the back yard under the big … Continue reading Protect Your Valuable Asset: Your Data

Read More

Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Earlier in 2016, after the U.S. Federal Bureau of Investigation (FBI) engaged in a legal battle with Apple over the unlocking of a particular iPhone device, little they knew it would reignite and escalate the old debate between security and privacy to unprecedented levels. On one hand, security advocates claim that one of the main … Continue reading Encryption: Could it Be a Key to Bridge the Gap Between Security and Privacy?

Read More

Dear CISO – Your Single Most Important Objective

Let’s say you’re the CISO. What is your single most important objective? I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data. The problem is, … Continue reading Dear CISO – Your Single Most Important Objective

Read More

5 Real-World Benefits of Data Encryption Software

Businesses that have already invested in traditional perimeter IT security firewalls and detection systems are continuously looking for something more to protect their data. Between external hackers and internal staff, protecting data in all states is too tall a task for most legacy solutions. To combat this trend, enterprises are considering data protection and specifically data encryption solutions as … Continue reading 5 Real-World Benefits of Data Encryption Software

Read More

It’s Time for a New Approach to DDoS Mitigation for Your Business

Any business that has found themselves under a DDoS attack knows just how damaging it can be. DDoS attacks can suspend the availability of your products or services for hours, sometimes even days, without the right security measures. What is a DDoS Attack? DDoS stands for distributed denial-of-service. This is an attack that hackers or … Continue reading It’s Time for a New Approach to DDoS Mitigation for Your Business

Read More

$750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

A recent settlement between the Department of Health and Human Services’ Office of Civil Rights, or OCR, and Indiana-based Cancer Care Group is highlighting the importance of information security governing company policies and healthcare data security. The two parties agreed to a $750,000 settlement after a data breach lead to the exposure of over 55,000 … Continue reading $750,000 HIPAA Settlement is a Harsh Reminder of the Need for Healthcare Data Security

Read More

Best Practices: Financial Services Encryption

Financial Services Encryption is a highly effective way to achieve data security. It involves translating information into a secret code and having access to a secret password or key to read an encrypted file. The 2 main types of encryption are the following: Public-key encryption: utilizes 2 different keys at one time. Only your computer … Continue reading Best Practices: Financial Services Encryption

Read More

Survey Shows Slow Down in Bring Your Own Device Trends

Industry watchers have been predicting a future boom in Bring Your Own Device (BYOD) policies in businesses. Gartner Research found that at least half of employers would require employees to provide their own devices by 2017. In addition, Mobile Device Management (MDM) has given birth to an entirely new market that’s expected to hit $4 … Continue reading Survey Shows Slow Down in Bring Your Own Device Trends

Read More

Educate Your Company on 3 Key Areas of Data Security

A recent study by Dell found that 75 percent of organizations have experienced some sort security breach within the last year. However, only 18 percent have made predicting and detecting future threats a top priority. Unfortunately, security strategies tend to be more reactive than proactive. Is that an effective approach? Not at all. In fact, … Continue reading Educate Your Company on 3 Key Areas of Data Security

Read More