CollaboristaBlog Roundup January 16

Welcome to your guide on the latest collaboration and data security news. This week features cybersecurity, mobile security, and data protection tips.


16 January 2015

CollaboristaBlog Roundup

Welcome to your guide on the most interesting collaboration, information security, and data privacy news and events.

Because you can’t follow all of the updates, we do it for you. Here’s a roundup of the latest and most popular topics to catch you up to speed. Check these out …

  • As we've seen in 2014, company data breaches from lax security have become more and more common. Just last year, millions of records were exposed from Fortune 500 companies. To help keep your valuable data safe this year, here are a few key lessons organizations can learn from past data breaches, as well as three trends to watch in 2015.
  • Given the number of hacks in 2014, we should only expect that threats will continue to become more prevalent and complex this year. Our chief technology officer, Daren Glenister, shared his own list of cybersecurity predictions 2015:
    • Prediction one: Hackers will target file sync and share (FSS) providers
    • Cyber hacking to become a state project
    • The law will play catch-up to the hackers
    • Cyber-crime on-demand?
  • If you want to learn more about last year's threats and vulnerabilities, as well as ways to safeguard your data this year, independent data security expert Graham Cluley will be reviewing the biggest computer security stories of 2014 and offering his predictions for 2015. To help you make actionable decisions around how to keep your information secure, you can register for the January 21 webcast (which is sponsored by Intralinks) here. All registrants will receive a free copy of Graham’s report on his 2015 predictions and data security and collaboration best practices.
  • We know from our experience that manual-based file sharing and storage technologies, such as a portable flash drive, do not offer the best means to store and keep data secure. In recent news, it appears that a portable flash drive containing the customer information of a California credit union, was stolen, lost, or destroyed. View our blog to read more about this story and gain some data protection tips on how to reduce your risk of information loss.
  • The need for strong information security when collaborating has driven the adoption of file sharing and enterprise collaboration solutions by General Counsels (as well as CIOs and other IT professionals). To learn more about what capabilities are needed to maintain strong security, control, and governance, check out this blog.
  • And when sharing information and collaborating, it's key that information be secured wherever it travels, this includes when employees are sharing information on-the-go and from multiple devices. Regardless if you support BYOD or company-issued devices, there are steps you can take today to secure your mobile enterprise, such as implementing an enterprise mobile application for storing and sharing sensitive information. Here are just a few of the capabilities you should consider when evaluating enterprise mobile applications.

Thanks for joining us, and stay tuned to our blog for more news each week.



Meagan Parrish

Meagan Parrish

Meagan Parrish is the Senior Manager of Social Media at Intralinks. She is responsible for social media strategy development and the communications for Intralinks' online communities. Meagan has been creating social media strategies for a variety of companies across verticals for the past several years. She holds Bachelor degrees in Marketing and Finance, with a minor in English Literature.