Toshiba hosts educational webinar on securing against a Wikileaks-type data breach
Tuesday, December 21, 2010
Press release from the issuing company
Irvine, Calif. – Inspired by the most recent WikiLeaks controversy, Toshiba America Business Solutions Inc. (TABS) hosted a free webinar to educate professionals on the security solutions available to help protect from leaks originating within the organization. Bill Blake, document security specialist, president and COO of eDocument Sciences, LLC, and a key Toshiba business partner, shared strategies on how to effectively control and protect an organization's mission-critical information and how to avoid a WikiLeaks-type disaster.
Recent events surrounding the unauthorized release of sensitive and confidential government information have shined a spotlight on the need for organizations to protect documents and information from internal, as well as external threats.
"In the past, many companies worried about strengthening their firewall security to protect their confidential information from outside threats or hackers," said Bill Melo, vice president, Marketing, Services and Solutions, TABS. "While we hope that everyone who's given access to sensitive information will keep it confidential, that's just not always the case. Businesses must begin to pay greater attention to internal risks and employ more document-specific security solutions."
Toshiba offers customers persistent document security through encryption technologies that limit document access and rights with Fasoo digital rights management solutions. Administrators can easily control access to Microsoft Office documents, PDFs, engineering drawings, images and other common file formats. They decide who can view, edit or print the documents and for how long and can even revoke access to a document after it's distributed.
In the United States alone, companies lose more than $600 billion a year due to fraud. The demand for safer information sharing is also increasing dramatically as more organizations adopt Enterprise Content Management (ECM) systems. Existing security measures within ECM applications provide insufficient document protection when files are opened and shared with external third parties. Lack of adequate document security exposes companies to significant risk and litigation if there is a breach of critical information. In addition to the innate desire to protect one's information and business, demand is also increasing due to recently passed federal regulations.
To post a comment Log In or Become a Member, doing so is simple and free