<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">

the bitglass blog

4 Risky Habits of BYOD Users

By Chantelle Patel  |  August 4, 2016 at 10:00 AM  | 


Read More

Securing Office 365 with a Cloud Access Security Broker

By Chantelle Patel  |  June 28, 2016 at 3:00 PM  | 

Office 365 is rapidly becoming the go-to solution for many organizations as they migrate to the cloud. With the implementation of new cloud programs come concerns around data protection and compliance.

Read More

A look back at the original Where's Your Data experiment

By Salim Hafid  |  February 25, 2016 at 9:00 AM  | 


Dark web downloads

After wrapping up Project Cumulus, the latest in the Bitglass Where's Your Data series, we looked back at the results and developments from our first Where's You Data test conducted early in 2015. In the original experiment, we leaked spreadsheets with fake names, credit card numbers, Social Security numbers, addresses, and other personal information to both the surface web and the Dark Web. These spreadsheets were embedded with Bitglass watermark technology that would regularly call back to our researchers. We got hundreds of hits globally, including many from crime syndicates in Nigeria and Russia.

As the chart above reveals, downloads and new callbacks were few and far between in the eight months following the leak. We didn't expect the long quiet period to end, but in October 2015, we observed a spike in downloads of these old files. 

Read More

Why do hackers target healthcare data?

By Salim Hafid  |  February 1, 2016 at 9:00 AM  | 


Healthcare data is an incredibly valuable commodity to hackers, so it's no surprise that organizations known to store Protected Health Information (PHI) are increasingly targeted by hackers that see the value in their trove of data. A recent Ponemon institute report found the cost of stolen healthcare records to be $363, far more than stolen credit card information simply because it's likely to remain valid for much longer.

While a credit card can quickly be cancelled and the number changed, often with no liability on the part of the user, leaked medical information often leads to identity theft and very few protections for the victim. A criminal could go about opening new accounts and requesting loans in your name without your knowledge, and without active credit monitoring, you would be none the wiser.

Read More