6 Steps for Data Breach Recovery and Prevention

Intralinks Webinar: Sharing and Collaboration in Today’s Workforce

Blog post

Secure collaboration is one of the most vital concepts in business today. In today’s workforce, employees are handling highly-sensitive corporate documents and sharing this information beyond the firewall through multiple channels and across various devices. It’s imperative that businesses maintain control over their data, while still enabling employees to share, collaborate and innovate. Managing this process can be challenging, but a collaboration solution can help keep companies’ most confidential information secure.

Advocate Data Breach Leaves 4 Million Patients at Risk

Blog post

On July 14th, four password-protected, unencrypted computers containing personal data of more than 4 million patients was stolen from an administrative building. As HealthITSecurity.com recently stated, this data breach has “become the second-largest HIPAA violation ever reported to the Department of Health and Human Services (HHS).”

Ooops! UK Serious Fraud Office suffers biggest ever data breach

Blog post

When we think about data loss, we often immediately think about theft – hacking, phishing or malicious insider activity. But the reality is that most data is lost through mundane human error, like hitting “reply all” to an email intended for one person, or attaching the wrong file to a message.

Top Trends in Enterprise File Sharing

Blog post

Businesses across all industries are rapidly adopting file sharing. As business activity becomes more demanding, it is important that enterprise file sharing use cases are thoroughly understood and accessible to various departments within an organization.

The Witless Protection Program

Blog post

According to Forrester Research, unintended mishandling of information is far and away the most common way that corporate data is lost – far more frequent than malicious acts of data theft or hacking. It’s clear we need a way to guard against our own fallibility and ensure we can always retract access to the information we share, even after it has been copied widely on email or shared through collaboration tools.