Author Archives: CloudMask Team

ITAR compliance: ignorance is no excuse

The ITAR (International Traffic in Arms Regulations) legislation details what measures businesses and individuals must take to comply with ITAR requirements and specifies severe penalties, both civil and criminal, for non-compliance. The reach of the regulations is broad and suppliers of all kinds may be subject to requirements to keep sensitive information secure and restricted.

Should You Encrypt Data Before it Goes to the Cloud?

 

American cloud service providers such as Microsoft are opening local data centers in foreign countries at the request of the respective foreign governments and customers located in those countries. The thinking behind this strategy is that data located in a particular country is subject to the country’s data privacy laws, which may be different from those in effect in the United States. When your data is stored in the country where your customers are resident, it seems logical to believe cloud service providers when they say their local data centers operate according to that country’s laws. In reality, the situation is more complicated, and the location of the data in a particular country is not enough to guarantee privacy.

Security certifications (part 1): What are the differences?

 

Data security is one the most important aspects of digital business in today's IT ecosystem, as organizations continue to experience breach after breach. Unfortunately - like other technological solutions - enterprises, individuals and other entities are often confused by, uncertain of or misunderstand technobabble, system specifications and certificates. After all, the average consumers and business leaders have more things to worry about than learning all the lingo involved in the tech and cybersecurity spaces.

How to reduce the consequences of Data Breach

The storing and processing of data sets that contain personally identifiable information (PII) is increasingly regulated and is subject to onerous notification requirements when data breaches occur. Such data includes health information, financial data and legal records. When your business stores or processes this information and when it can be linked to a particular person, you are automatically subject to the applicable regulations.