How does Wiretap’s Yammer Retention tool help with regulatory compliance? 

Posted by Matt Huber on Sep 18, 2017 7:59:36 AM

Many risk-adverse companies find that keeping their Yammer content for too long is a risky practice when disaster strikes.  Disaster can come in many forms; a security breach, lawsuit, information ex-filtration and more.

Read More

Topics: ESN, ESN Security, Yammer governance, Record Retention, Regulatory Compliance, Office 365, Microsoft, Yammer

The Hidden Cost of Security-Related Consent Decrees - The Secret Weapon of Regulatory Agencies

Posted by Greg Moran on Aug 22, 2017 5:10:50 PM

For those of us that have worked in highly regulated industries, consent decrees are not a new concept. However, in the tech industry, many companies are beginning to understand the power of this regulatory weapon. Last week the FTC slapped a consent decree on Uber for its flawed privacy practices that led to the disclosure of private information for 100,000 Uber drivers. The FTC cannot fine a company for its first violation, so many viewed the consent decree as a slap on the wrist for a serious violation. Perhaps they should have been fined, but let's parse the effect of that consent decree for a moment to see what it really means.

Read More

Topics: Consent Decree, Security Audit, Uber

Intellectual Property Leaks: A Top ESN Security Risk — A Wiretap Infographic Series (5 of 5)

Posted by Britt Newton on Jul 26, 2017 5:24:42 PM

On average, intellectual property (IP) constitutes at least 80% of a company’s value. At any point in time, that IP is at risk from employees and partners that may accidentally or purposely expose business plans, merger/acquisition details, R&D results or patent information to unauthorized parties in or outside the company. A single leak can cost an organization millions — even billions — of dollars.

Read More

Topics: Infographic Series

Noncompliance: A Top ESN Security Risk — A Wiretap Infographic Series (4 of 5)

Posted by Britt Newton on Jul 24, 2017 5:19:00 PM

The risks and costs associated with noncompliance can be extremely high. In some industries, financial penalties alone can cost an organization tens of thousands of dollars a day. This doesn’t include the time and expense of getting and staying compliant, damage to the company’s reputation, loss of shareholder trust, and so on.

Read More

Topics: Infographic Series

Insider Threats: A Top ESN Security Risk - A Wiretap Infographic Series (3 of 5)

Posted by Britt Newton on Jul 21, 2017 1:32:00 PM

Organizations have always faced threats from inside. At any given time in a large, competitive workplace, there is usually at least one individual plotting their exit, attempting to garner information, business contacts and customers on their way out — or an employee or partner involved in some type of criminal activity. Sometimes, employees are inadvertently involved in malicious insider activity without even knowing it — tricked by another employee to send a file or download and share a document that shouldn’t be shared. Now with ESNs on the rise, those same employees and partners have even greater access to sensitive information that can be used against the company.

Read More

Topics: Infographic Series

Data Leaks: A Top ESN Security Risk — A Wiretap Infographic Series (2 of 5)

Posted by Britt Newton on Jul 13, 2017 4:55:00 PM

A single data leak can cause millions of dollars or more in damage to an organization. ESNs and collaboration tools that aren’t properly monitored or secured expose the enterprise to possible data leaks and general chaos.

Read More

Topics: Infographic Series

HR Policy Violations: A Top ESN Security Risk — A Wiretap Infographic Series (1 of 5)

Posted by Britt Newton on Jul 7, 2017 11:31:00 PM

Every large organization deals with HR policy violations and issues. Some execs might fear that a private social network could encourage unproductive behavior, but the opposite is true. The key is ensuring that the collaboration network and tools are properly secured and monitored.

Read More

Topics: Infographic Series

Security and the Enterprise Social Network

Posted by Matt Huber on Jan 3, 2017 3:00:00 PM

By now, most people have heard of or are using a Enterprise Social Networks (ESN). You are probably using one in the form of Instant Messengers, Chat clients, or bulletin boards in your company and haven’t put that label on it. When we talk about these terms, they almost sound generic and archaic. But if you are new to them, the best way to describe these is to boil them down to their core components. Remember AOL chat rooms? A/S/L anyone? How about Bulletin Board systems? Those require admins to skim content to prevent the community from going up-in-flames. What if we add those systems to the enterprise today and mix in your culture? You may find that you have a pretty risky, yet rewarding tool to use. We call that Unsafe Collaboration.

Read More

Topics: ESN, Enterprise Social Network, ESN Security

The Obligations of the CIO in Today’s Cyber War

Posted by Greg Moran on Dec 21, 2016 4:03:00 PM

The CIO job is a tough one these days…you have to be a strategist, a budget hawk, a peace-maker, a people leader, a police captain, a friend and an evangelist. Wow…that’s a lot of hats to wear and I’m only scratching the surface — there are more! The role I want to focus in on today is the police captain role. That’s another job role that requires a lot of hats…at least the CIO role doesn’t involve life and death!

Read More

Topics: ESN, CIO, ESN Security

A CIO’s Perspective on Enterprise Social Networks

Posted by Greg Moran on Nov 21, 2016 2:23:00 PM

Over the last decade, we’ve seen the internet cross over the tipping point to an always on, high bandwidth solution. In conjunction with reaching critical mass on key standards and the explosion of mobile as a high function end-point, we’ve seen a tsunami of software innovation precipitated by the low barriers to entry for developers and low cost of acquisition/ease of use on the consumer side. These are really cool outcomes that have been talked about ad nauseam, so let’s get specific.

Read More

Topics: ESN, Enterprise Social Network, CIO, ESN Security