Home  //  Tags
ReSoft Blog
Reputation and Risk Management through Data Loss Prevention, ediscovery and Compliance in email, Social Media and mobile

Stay alert to Holiday shopping scams Subscribe Email Print

Holiday shopping mania is in full swing with post Cyber Monday deals popping up in inboxes and social feeds everywhere. And not just in the US -  despite the fact that these shopping specials are triggered by the Thanksgiving holiday, in the UK, retailers are offering heavy discounts. Offers in the UK are likely in response to rising inflation, a dip in annual sales figures, and a hike in interest rates; the aggressive sales by retailers on both sides of the pond present a golden opportunity for cybercriminals — an environment in which onlineshoppers are seeking (and expecting) better-than-average deals.

So maybe it is more important than ever for employees shopping from work to brush up on online shopping tips and cybersecurity best

Read more

New report: employee work habits risk data breaches Subscribe Email Print

How the changing work environment is creating new data security challenges

The much anticipated Internet Trend 2015 report has been released by Mary Meeker, General Partner at Kleiner Perkins Caufield & Byers. The reports gives a great window into what is coming in tech.

It reports that that while Internet user growth has slowed, the impact of how Internet is being used continues to change rapidly. Whilst many changes appear to reflect consumer interests  - eg: Social Media, Netflix – these changes also have a major impact on enterprises.
 
Regardless of who owns a device, the need for mobility and use of personal devices impacts enterprise data security. The report says 6 out of 10 of the most used apps in the world are
Read more

Defining the Risk from Social Media Subscribe Email Print

yellowtriangleWhen experts talk about social media risk, the conversations focus on how to control how Social Media tools are used.

Clearly, access to Social Media tools place employee communications outside of the organization's control, as a result of it being:

  • a real-time communication,
  • a rapid one-to-many publication through private and public networks and
  • a democratization of access to individuals and audiences.

As defined on the JD Supra blog, and Blue Hills' Social Media Risk report, the risk from using Social Media is not in the communication itself, but in deeper worries: sensitive corporate information disclosure, reputational harm, fraud and conflicts of interest. These are not unique to Social Media but manifest themselves very

Read more

Get your electronic discovery together for social media governance and ediscovery Subscribe Email Print

There was a time when the production of information in civil litigation primarily consisted of the exchange of hard-copy, paper records. Those days are long gone.

Now we live in an age that features all kinds of electronic data. It is critical to get it correct when it comes to Electronic Discovery -  as the downside consequences for getting it wrong can be severe.

Duane Morris reports that as soon as litigation happens or is reasonably believed to be on the horizon, it is imperative to implement a "legal hold" to preserve potentially relevant data. In this way, relevant data will not be destroyed. The failure to preserve relevant data can lead to charges of spoliation of evidence. Actual spoliation can lead to court orders excluding

Read more

Contact Re-Soft today to get help!

helpdeskimage

To order products or request more information, click here or email This email address is being protected from spambots. You need JavaScript enabled to view it. detailing your requirements or call us at (203) 972-8462 to discuss your needs.
Scroll Up