Why You Shouldn’t Email Sensitive Corporate Documents

E-mail traverses the public Internet in plain text, and can be easily copied or intercepted. Just ask the Gmail users famously hacked in 2010 and again in 2011, or the U.S. Chamber of Commerce which had at least six weeks worth of e-mail data containing sensitive information stolen in a breach that was widely reported in December 2011.

Today, as increasing global competition drives the need for increasing inter-enterprise collaboration, the use of e-mail to share collaborative information with partners and geographically dispersed team members creates unacceptable security, compliance, and information governance risks. If your users are collaborating on a sensitive project and sharing a confidential document or data, the last thing you want them to do is e-mail it back and forth over the Internet.

I provide some strategies to get around this issue in a white paper that I wrote for Intranlinks here.

Whitepaper: Dealing with patch management

Organizations need a comprehensive patch management solution which provides endpoint protection beyond the typical operating system in order to effectively and efficiently minimize risks caused by the vulnerabilities that are inevitable in modern computing systems.

In this paper for white paper for Lumension/Redmond Magazine, I talk about how to manage patching across the enterprise.

Webinar: Integrating Cloud Services Management Into Your IT Operations

Getting into the cloud is a lot easier than understanding how to make it a part of your overall IT operations. In this webinar, I look at ways that you can better govern your cloud deployments and make use of the best practices of IT that you use for your own servers. I will show you more than a dozen different services that can help you understand your cloud computing costs, figure our better ways to make your cloud infrastructure secure, and better manage your cloud deployments.

The webinar is held this Thursday at 12:30 pm ET.

You can register for the webinar here, download the white paper Dec Cloud Integration here, and view the slides that I will use for the event here.

MarkMonitor: Brandjacking Tablet PCs

When you buy tablet PCs online, there are many low-priced bargains to tempt you and it can be hard to be a discerning consumer. The Internet provides instantaneous sales and promotion channels for legitimate manufacturers, as well as less than scrupulous manufacturers, who can represent hidden competition to legitimate manufacturers. These online brandjackers pay close attention to market trends, especially those involving well-known brands, and are quick to line their own pockets at the expense of legitimate brands.

In my latest whitepaper for MarkMonitor here, (registration required) I examine how over the course of a single day this summer they found more than 23,000 listings for suspicious tablets. Of course, given that many of them are sold at 70% discount, it isn’t surprising that many consumers are tempted.

Markmonitor: Spring 2011 Brandjacking Index on Online Hotel Bookings

The online hotel bookings business is a lucrative one for fraud, but it is fraud of a very insidious nature: The major hotel brands are losing billions of dollars a year, and much of this business is being snapped up by their own legitimate online travel agents who get to the customer first through a variety of ploys. It is surprising how these agents can game the paid search results and squat on a variety of domain names that misrepresent themselves, with almost 360 million visits being diverted from the hotels’ own sites.

You can download the report (after registering) here that I did for Markmonitor.

Super Bowl XLV edition

I have two efforts surrounding the Super Bowl that I am particularly proud of that were posted this week. Not being anything of a sports fan, it is quite ironic.

Here is a report published by MarkMonitor on the fraud and abuse around sports branded apparel. It is an area rife with counterfeit merchandise, as you will see from my BrandJacking report.  (need to register)

And an article that I wrote for ITworld prior to the Super Bowl at the Cowboy’s stadium. This is my second visit to this sports palace (my first can be found here when it was still under construction). For IT folks, there is a lot going on there that is worth a look.

Markmonitor: Brandjacking Index 2010 on Luxury Goods

Everyone wants a bargain, but when it comes to buying luxury handbags and other high-priced name brand consumer goods online the deals are usually too good to be worth it. Given the discounts offered, it is no surprise that the amount of counterfeit goods being sold approaches nearly half the legitimate volume of the genuine articles.

But what is surprising is the level of sophistication that the fraudsters will go to place their sites high on search pages and purchase pay-per-click ads, making it harder to find the real articles from the name brand vendors when shopping online.

In this edition of the Brandjacking IndexTM, we look at the abuses in the luxury consumer goods sector. It isn’t a pretty picture, despite the smooth buttery leather exterior that many of the real handbags offer. You can register and download the full report here.

Markmonitor Brandjacking Report: 2009 in review

While 2009 was a year of economic downturn for most legitimate businesses, fraudsters worked overtime to trap unwary Internet victims.  In this edition of the Brandjacking Index, we look at the overall trends for 2009. We found that con artists are exploiting the economy and sharpening their targets at well-known brands for their own profit. Cybersquatting continues as the tool of choice and there was a big increase in phishing attacks last year, particularly targeted at financial services businesses.

You can download the report here (registration required).