Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship.

Slides:



Advertisements
Similar presentations
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 © Copyright 2013 EMC Corporation. All rights reserved. Online File Synchronization and Sharing for the Enterprise.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Developing a Records & Information Retention & Disposition Program:
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Mobility Methods for document access while away from the office.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
April, 2008 Microsoft Rights Management Service (RMS) Review.
GUIDE TO SMALL BUSINESS RECORDKEEPING. CONTENTS INTRODUCTION BASIC CONSIDERATIONS FURTHER CONSIDERATIONS WHAT TO KEEP & FOR HOW LONG SETTING UP YOUR BOOKKEEPING.
Making the Internet a Better Place for Business NIST PKI Steering Committee March 14, 2002.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Xiaoyue Jiu, Fola Oyediran, Eboni Strawder | Group 10
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
RULES OF ENGAGEMENT Engage if client expresses an interest in data preservation Engage if the client is experiencing one or more “pains” (see “customer.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
SODA Archiving October 2013
Empowering Your Users-Security & Mobility Bil Martin 1.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Digital Imaging Services Digital Imaging Services – We take information from any format (i.e. Paper, Microfilm, Microfiche, Digital, etc.) and move it.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
Security considerations for mobile devices in GoRTT
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
© 2009 PGP Corporation Confidential State of Key Management Brian Tokuyoshi Solution Manager.
Leveraging Technology to Protect & Grow Your Business… Could Your Business Survive a Disaster? Presented by Dan Jenkins, Vice President, eAgency Systems.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
The State of Computer & Data Security in Corporations Independent Survey.
Module 7 Planning and Deploying Messaging Compliance.
Management ’06 : Best Practice & Compliance in the Public Sector Controlling the Inbox Dr Keith Nicholson Alfred McAlpine Business Services Information.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Managed File Transfer EasyDocEx The easiest way to transfer files and documents securely! EasyDocEx The easiest way to transfer files and documents securely!
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
All Partner Meeting A cloud-based Identity and Password Management solution used by MSPs to better manage their clients' passwords, increase security,
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Secure Services Shared Hosted MS Exchange 2010.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
KeepItSafe Solution Suite Securely control and manage all of your data backups with ease, from a single location. KeepItSafe Online Backup KeepItSafe.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
UW-Madison Guidelines for Managing the Records of Departing Employees*
Barracuda Mobile Device Manager
Chapter 3: IRS and FTC Data Security Rules
Introduction to Soonr by ….
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
Searchable. Secure. Simple.
The Backup Limitations of Microsoft Office 365
Microsoft Data Insights Summit
Explain the role of ethics in financial- information management
Protect data in core business applications
Presentation transcript:

Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship Manager focusIT focusIT focusIT

Welcome Security is Priority #1

Welcome Compliance Now Includes Ensuring Borrow Data, in all Forms, is Secure Today’s mortgage environment is vastly different than when most file sharing solutions were initially implemented Keeping client data safe is now core to every mortgage operation Showing how files are shared with outside parties is now a key step in compliance audits

Welcome Mortgage Professionals Way of Thinking and Handling Borrower Files Must Change I’ll just the W2…

Welcome Today’s Common File Sharing Methods: USB Drives Cloud Drives

Welcome Method 1: The Evolution of has assumed the role of being the primary data and file transport system for most enterprises attachments have grown Sensitive borrower information is often included inside attachments

Welcome Method 1: Challenges with Attachment size restrictions Unencrypted borrower data Use of personal Webmail accounts Retention policies

Welcome Method 1: Solutions to Challenge: Utilize secure sharing solution for large files Deploy policy-based encryption Enforce company policy against personal accounts Deploy archiving

Welcome Method 2: USB Drives The Evolution of Physical Media: USB drives provide easy, reliable mobile computing Unaffected by file size limits Sensitive borrower information is often stored

Welcome Method 2: USB Drives Challenges with USB drives: Scattered data across multiple locations Unencrypted borrower data Highly susceptible to loss, damage or stolen borrower data

Welcome Method 2: USB Drives Solutions to USB drive Challenges: NEVER USE USB DRIVES!!!

Welcome Method 3: Cloud Drives Evolution of Cloud Sharing Solutions: Solves encryption issues Solves mobility issues Solves file size issues

Welcome Method 3: Cloud Drives Challenges of Cloud Sharing Solutions:  Are there audit trails?  Is borrower data properly retained?  Is corporate alerted if data is compromised?  Which company files are in employees’ “Dropbox” folders?  What to do when employees suddenly leave with company files in their “Dropbox” folder?

Welcome The New Priority #1: Security Today’s Mortgage Environment Leaves Zero Tolerance Relative to Security Lapses Safeguarding borrower data is paramount to every mortgage operation Regulatory compliance now mandates proper safeguards are in place for all borrower information Record retention requirements are lengthier than ever

Welcome The New Priority #1: Security Employees Want Easy Access to Borrower Information Any Place, Anytime, Anywhere  Business requirements are directly opposite to compliance needs  IT departments must ensure remote workers use stringent authentication and permission rights  Also must ensure data privacy and security at all times

Welcome Concerns to Ask Any Software as a Service Provider  Does the solution provide proper recordkeeping for confidential data storage, retention and accessibility (GLBA compliance)?  Does it ensure end-to end encryption of data?  Does it reside within SAS 70 and SSAE 16 compliant data centers?  Does it provide adequate uptime service guarantees?

Welcome Our Solution: SecureShare

Welcome Our Solution: SecureShare Provides One Option to Solve the Compliance Challenge Strict adherence to mortgage policies and government regulations Easy to manage and use (Cloud storage for mortgage companies) Setup and managed by a partner you already know and trust with your PointCentral data Cost effective

Welcome Q&A Contact Us: focusIT, Inc Sales Team (480) opt. 2 Demo Sign-up: