SlideShare a Scribd company logo
CloudMask thinks differently in the secure-cloud landscape.
Law firms keep sensitive client data secure with CloudMask.
The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry,
making accessible to sole proprietors and small businesses software functionality that historically required significant
investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile
and efficient than they used to be, allowing them to run competitive circles around larger or laggard players.
The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of
business management and administrative efficiencies.
The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns.
Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an
ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for
investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious
hands.
So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National
Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected?
One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet
that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard.
There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We
really haven’t solved that problem.”
The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle-and moat
metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and
software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if
security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others
with access to the internal network).
Law firms keep sensitive client
data secure with CloudMask
CloudMask for the legal profession
Increasingly, small and medium-sized law firms are adopting a variety of cloud services to raise their level of service and
reduce the costs of management. Lawyers are also finding themselves communicating with clients via email, both for basic
conversations and document-sharing. Lawyers have a duty of confidentiality to their clients. Whether using practice
management software as a service, communicating with clients using free webmail, or leveraging file-sharing services, the
lawyer has a duty to minimize the risks of unauthorized individuals intercepting and viewing confidential information.
Success or failure in data protection can mean the difference between winning and losing a case.
Cloud service providers generally have security stories that provide comfort to non-cyber professionals. These often
include claims around “bank-grade” or “military-grade” encryption, which refers to the protection of data as it travels from
the client network to the cloud provider’s network.
But what’s often left unstated is the fact that cloud vendors either store sensitive data in unencrypted form or encrypt the
data with a method that requires the cloud vendor to have a cryptographic key. Both present strong vulnerabilities and risks
to privacy and confidentiality. Many attorneys who have adopted practice management software continue to be concerned
about data protection. While such applications’ security design reflects best-industry practices, the traditional security
industry continues to be sabotaged by hackers. Massive data breaches of sensitive personal data violate privacy, damage
business brands, and incur significant remediation costs. With CloudMask, legal practice management software users can
ensure that sensitive data remains protected in the event of system breaches, and therefore prevent triggering costly
notification and identity theft processes called for by data protection regulations. CloudMask’s approach ensures that only
authorized individuals have keys to decrypt sensitive data. This means that once data is masked, none of the third parties
processing the data can ever see that data in the clear. Data is protected from the moment of its creation to the moment it
arrives on an authorized user’s device.
Clio is the first legal practice management software to facilitate CloudMask integration, allowing clients to protect sensitive
data and use the cloud with confidence. CloudMask Clio can be combined with Gmail and Google Drive, ensuring that both
legal practice management data and communications occur under total end-to-end encryption.
CloudMask thinks differently.
We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known
devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that
when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve
created a solution that can be installed, configured, and afforded by small businesses without IT staff.
The SaaS Security Problem – Simplified
SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the
application runs on.
One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL
encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16
specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely
audited by respected third parties.”
By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When
you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is
decrypted for insertion into the app’s database.
The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only
employees with the proper identification and access passwords can physically or virtually access the servers that hold the
application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with
policy.
There are three vulnerabilities that should concern executives:
1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in
from any browser in the world.
Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this
happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers.
2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials
stolen, meaning that an authorized system administrator could access application data for malevolent purposes.
Insiders don’t need to be “bad” to present a threat. They can simply be careless.
A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to
mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their
cloud service providers to maintain security hygiene. That’s a lot of blind faith.
3. Governments have the desire, capacity and experience to tap into the cloud-service providers that hold the
world’s data.
The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On
the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security
Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement
operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact
the firm’s liability for data breaches, and the capacity to deliver on a promise of client confidentiality and privacy.
In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject
to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify
individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws
mandate heavy fines for firms who violate data protection regulations.
If you think the solution is not to use cloud, think again.
The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions,
thinking perhaps that an on premise solution (a server running in your office) are safer. Unfortunately, that is not the case.
Your office or server room isn’t nearly as secure as an access-controlled data center.
CloudMask: a silver lining for SaaS
CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data-
breaches, differentiate by offering highly secure data management and communications, and use economical cloud
services with confidence.
The CloudMask Approach:
CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data before it
enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256-bit protection
ends, CloudMask data stays masked.
This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double-
encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption is
removed, and CloudMask seamlessly unmasks to present the data in the clear.
Alongside controlling users and their access rights, practice management account owners/administrators can have the capacity
to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive personal
data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and unmasking.
From a functional perspective, CloudMask resolves the concerns that executives
might have with respect to using SaaS applications:
1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a simple
process generating the personal, private and public keys required for the encryption process. What’s more, the extension can be
installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a username and password
are somehow compromised, which under normal circumstances would allow anyone anywhere in the world to log into the
account and see data in the clear, the unauthorized user cannot do so without access to the specific devices configured with the
personalized browser extension.
2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice management
SaaS vendor nor CloudMask administrators nor data center administrators have keys that can be used to unmask the data. If the
data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a government agency serves a National
Security Letter), data the user has designated as sensitive remains protected.
3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was previously
sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or personally identifying
information, so it no longer falls under data protection regulations or requirements. In other words, breaches of systems holding
tokenized data do not trigger the costly response and remediation efforts associated with breaches of systems holding sensitive
personal information.
The Technical Story
A separate e-book explains the technical details behind this process and the software that automates it, as well as describing the
benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” It also provides a brief explanation of the
well-established public/private key methods used by the encryption process.
Grounded Confidence
CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology Security
Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security products for their
own use.
The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and
performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments.
CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification. More
expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can access
CloudMask’s Common Criteria Assessment here.
It’s easy to get started with CloudMask. Visit www.cloudmask.com

More Related Content

PDF
Cashing in on the public cloud with total confidence
PDF
Protect your Data even under breach
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
New Approaches to Security and Availability for Cloud Data
 
PPTX
Practical Security for the Cloud
PDF
Cloud Insecurity and True Accountability - Guardtime Whitepaper
PPTX
9 Things You Need to Know Before Moving to the Cloud
Cashing in on the public cloud with total confidence
Protect your Data even under breach
MIST Effective Masquerade Attack Detection in the Cloud
New Approaches to Security and Availability for Cloud Data
 
Practical Security for the Cloud
Cloud Insecurity and True Accountability - Guardtime Whitepaper
9 Things You Need to Know Before Moving to the Cloud

What's hot (20)

PDF
Data loss prevention by using MRSH-v2 algorithm
DOCX
Cloud Computing Security
PDF
Your Data Center Boundaries Don’t Exist Anymore!
 
PDF
ISSA: Cloud data security
PDF
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
PDF
Attributable Networks - Guardtime Whitepaper
PDF
Cloud Computing
PDF
br-security-connected-top-5-trends
PPTX
Microsoft Platform Security Briefing
PDF
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
PDF
internal-cloud-audit-risk-guide
PDF
The Rise of Data Ethics and Security - AIDI Webinar
PDF
Clearswift f5 integration
PDF
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
PDF
DLP Executive Overview
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
Packt publishing book proposal api and mobile access management
PDF
Is Cloud the new home for Cyber Criminals? How to be Safe?
PPTX
Data Loss Prevention
PDF
Cloud Computing Security
Data loss prevention by using MRSH-v2 algorithm
Cloud Computing Security
Your Data Center Boundaries Don’t Exist Anymore!
 
ISSA: Cloud data security
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Attributable Networks - Guardtime Whitepaper
Cloud Computing
br-security-connected-top-5-trends
Microsoft Platform Security Briefing
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
internal-cloud-audit-risk-guide
The Rise of Data Ethics and Security - AIDI Webinar
Clearswift f5 integration
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
DLP Executive Overview
Technology Overview - Symantec Data Loss Prevention (DLP)
Packt publishing book proposal api and mobile access management
Is Cloud the new home for Cyber Criminals? How to be Safe?
Data Loss Prevention
Cloud Computing Security
Ad

Viewers also liked (8)

PPTX
Tejido sanguineo
PPTX
Profile Công ty TNHH Dịch vụ tổng hợp và công nghệ Phúc Bình
PDF
Turaco_Digital
DOCX
Ashok Sanap - Service Engineer
DOCX
Financial management assignment
PDF
Global Security Certification for Governments
PDF
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Tejido sanguineo
Profile Công ty TNHH Dịch vụ tổng hợp và công nghệ Phúc Bình
Turaco_Digital
Ashok Sanap - Service Engineer
Financial management assignment
Global Security Certification for Governments
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Ad

Similar to Law firms keep sensitive client data secure with CloudMask (20)

PDF
Securing sensitive data for the health care industry
PDF
Keep Student information protected while improving services
PDF
Protect your confidential information while improving services
PDF
eBook: 5 Steps to Secure Cloud Data Governance
PPTX
Cloud computing - Assessing the Security Risks - Jared Carstensen
PPTX
Emerging privacy laws are reshaping data room standards
PDF
White Paper: Protecting Your Cloud
PDF
Get The Information Here For Mobile Phone Investigation Tools
PDF
Cloud Data Protection for SaaS Applications is Essential for Data Security an...
PDF
Security: How Do Cloud Hosting Providers Ensure Protection?
PDF
Can You Trust Cloud Security In Public Cloud?
PDF
Security and the cloud
PDF
10 Tips for CIOS Data Security in the Cloud
PDF
Risk Management in the Cloud
DOCX
Cloud computing seminar report
PDF
Improve service while cutting cost
PDF
Module 5-cloud computing-SECURITY IN THE CLOUD
PDF
The Myths of the Cloud are Holding Businesses Back
PDF
Is data sovereignty the answer to cloud computing risks
PDF
Carrying out safe exploration short of the actual data of codes and trapdoors
Securing sensitive data for the health care industry
Keep Student information protected while improving services
Protect your confidential information while improving services
eBook: 5 Steps to Secure Cloud Data Governance
Cloud computing - Assessing the Security Risks - Jared Carstensen
Emerging privacy laws are reshaping data room standards
White Paper: Protecting Your Cloud
Get The Information Here For Mobile Phone Investigation Tools
Cloud Data Protection for SaaS Applications is Essential for Data Security an...
Security: How Do Cloud Hosting Providers Ensure Protection?
Can You Trust Cloud Security In Public Cloud?
Security and the cloud
10 Tips for CIOS Data Security in the Cloud
Risk Management in the Cloud
Cloud computing seminar report
Improve service while cutting cost
Module 5-cloud computing-SECURITY IN THE CLOUD
The Myths of the Cloud are Holding Businesses Back
Is data sovereignty the answer to cloud computing risks
Carrying out safe exploration short of the actual data of codes and trapdoors

Recently uploaded (20)

PDF
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
PDF
Vinayaka Mission Law School Courses and Infrastructure.pdf
PPT
wipo: IP _smes_kul_06_www_6899913 (1).ppt
PPTX
Income under income Tax Act..pptx Introduction
PDF
Plausibility - A Review of the English and EPO cases
PPTX
POSH Awareness and policy ppt with all design covering .
PPTX
Ethiopian Law of Contract short note.pptx
PDF
A SEP and FRAND Overview 13 Aug 2024.pdf
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
Lecture 3 RulesRegulation-in-Meat-Inspection_Laylay-Edrian.pptx
PPTX
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
PPT
Cyber-Crime-in- India at Present day and Laws
PDF
Notes on Plausibility - A Review of the English and EPO Cases
PDF
Analysis Childrens act Kenya for the year 2022
PDF
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PPT
Criminal law and civil law under of collage corriculum
PPTX
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
PPTX
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx
AHRP LB - Quick Look of the Newly-initiated Koperasi Merah Putih (KMP).pdf
Vinayaka Mission Law School Courses and Infrastructure.pdf
wipo: IP _smes_kul_06_www_6899913 (1).ppt
Income under income Tax Act..pptx Introduction
Plausibility - A Review of the English and EPO cases
POSH Awareness and policy ppt with all design covering .
Ethiopian Law of Contract short note.pptx
A SEP and FRAND Overview 13 Aug 2024.pdf
looking_into_the_crystal_ball - Merger Control .ppt
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
Lecture 3 RulesRegulation-in-Meat-Inspection_Laylay-Edrian.pptx
ART OF LEGAL WRITING IN THE CBD [Autosaved].pptx
Cyber-Crime-in- India at Present day and Laws
Notes on Plausibility - A Review of the English and EPO Cases
Analysis Childrens act Kenya for the year 2022
CRIMINAL PROCEDURE BY HON. JUSTICE BAH.pdf
Lecture Notes on Family Law - Knowledge Area 5
Criminal law and civil law under of collage corriculum
RULE_4_Out_of_Court_or_Informal_Restructuring_Agreement_or_Rehabilitation.pptx
2.....FORMULATION OF THE RESEARCH PROBLEM.pptx

Law firms keep sensitive client data secure with CloudMask

  • 1. CloudMask thinks differently in the secure-cloud landscape. Law firms keep sensitive client data secure with CloudMask. The economic value proposition of Software as a Service (SaaS) is undeniable. SaaS is disrupting industry after industry, making accessible to sole proprietors and small businesses software functionality that historically required significant investment in hardware, software, and annual maintenance fees. This, in turn, is making smaller players even more agile and efficient than they used to be, allowing them to run competitive circles around larger or laggard players. The good news is that rich software functionality is often available for less than $100 per month, enabling high levels of business management and administrative efficiencies. The bad news is that the tempting sky of cloud and SaaS computing is filled with thunderclouds of cybersecurity concerns. Despite the best efforts of traditional cybersecurity experts, the adoption of cloud computing has been accompanied by an ever-growing number of egregious data breaches. These breaches damage brands and drive up significant costs for investigations, notification, and identity-theft protection for clients whose personal information has drifted into malicious hands. So, what’s going on? Why do even the largest enterprises struggle with securing their data? Wouldn’t the National Security Agency be one of the most rigorous security practitioners in the world? What leaks have we not yet detected? One thought leader at a major global cybersecurity consultancy explained it like this: “We’re trying to examine every packet that flows across the perimeter of the network and notice IP addresses that don’t make sense. This is incredibly hard. There’s a ridiculous amount of data, and we’ve entered an age where the network no longer has clear boundaries. We really haven’t solved that problem.” The problem lies in the way traditional security thinkers have defined the problem. They’re working with a castle-and moat metaphor, where the internal network is protected with a set of security rings. Each ring, however, has costly hardware and software searching for malevolent inbound and outbound data. But it’s like looking for needles in a haystack. And even if security experts are successful at protecting the perimeter, there is little protection against insiders (employees or others with access to the internal network). Law firms keep sensitive client data secure with CloudMask
  • 2. CloudMask for the legal profession Increasingly, small and medium-sized law firms are adopting a variety of cloud services to raise their level of service and reduce the costs of management. Lawyers are also finding themselves communicating with clients via email, both for basic conversations and document-sharing. Lawyers have a duty of confidentiality to their clients. Whether using practice management software as a service, communicating with clients using free webmail, or leveraging file-sharing services, the lawyer has a duty to minimize the risks of unauthorized individuals intercepting and viewing confidential information. Success or failure in data protection can mean the difference between winning and losing a case. Cloud service providers generally have security stories that provide comfort to non-cyber professionals. These often include claims around “bank-grade” or “military-grade” encryption, which refers to the protection of data as it travels from the client network to the cloud provider’s network. But what’s often left unstated is the fact that cloud vendors either store sensitive data in unencrypted form or encrypt the data with a method that requires the cloud vendor to have a cryptographic key. Both present strong vulnerabilities and risks to privacy and confidentiality. Many attorneys who have adopted practice management software continue to be concerned about data protection. While such applications’ security design reflects best-industry practices, the traditional security industry continues to be sabotaged by hackers. Massive data breaches of sensitive personal data violate privacy, damage business brands, and incur significant remediation costs. With CloudMask, legal practice management software users can ensure that sensitive data remains protected in the event of system breaches, and therefore prevent triggering costly notification and identity theft processes called for by data protection regulations. CloudMask’s approach ensures that only authorized individuals have keys to decrypt sensitive data. This means that once data is masked, none of the third parties processing the data can ever see that data in the clear. Data is protected from the moment of its creation to the moment it arrives on an authorized user’s device. Clio is the first legal practice management software to facilitate CloudMask integration, allowing clients to protect sensitive data and use the cloud with confidence. CloudMask Clio can be combined with Gmail and Google Drive, ensuring that both legal practice management data and communications occur under total end-to-end encryption. CloudMask thinks differently. We see the problem in simpler terms: protecting sensitive data and ensuring that only authorized users, using known devices, can see data in the clear. We’re happy to let the traditional security experts work on their perimeters, knowing that when they fail, our customers’ data remains secure. And, in contrast with products designed for big enterprises, we’ve created a solution that can be installed, configured, and afforded by small businesses without IT staff. The SaaS Security Problem – Simplified SaaS applications use best-practice security protocols and rely on their cloud provider to secure the infrastructure the application runs on. One vendor explains it this way: “We ensure that your communications are secure using bank-grade 256-bit SSL encryption. All of (our) infrastructure is hosted using physically secure, managed data centers that meet the rigid SSAE 16 specifications. Geo-redundant backups are performed multiple times per day, and site security and privacy are routinely audited by respected third parties.” By means of 256-bit SSL encryption, the connection between your browser or app and database servers is secured. When you submit a query or update, the data is encrypted as it transits the internet. Once the data reaches the data center, it is decrypted for insertion into the app’s database. The data center itself (e.g., Amazon Web Services) has a rigorous set of security controls and protocols, meaning that only employees with the proper identification and access passwords can physically or virtually access the servers that hold the application’s data. SSAE 16 is a standard according to which data centers are audited for their degree of compliance with policy.
  • 3. There are three vulnerabilities that should concern executives: 1. Anyone who tricks a user into revealing their username and password can impersonate that user and log in from any browser in the world. Such a hacker can impersonate the user and perform administrator functions. You don’t have to be a fool to have this happen to you. Even a sophisticated user like CIA Director John Brennan has fallen prey to high school-age hackers. 2. Any insider (employee of the data center) can turn from “good” to “bad” overnight or have their credentials stolen, meaning that an authorized system administrator could access application data for malevolent purposes. Insiders don’t need to be “bad” to present a threat. They can simply be careless. A recent report on cybersecurity suggests that less than 50 percent of organizations have adequate policies in place to mitigate insider-threat risks. The challenge here is that executives depend on their SaaS provider, who in turn rely on their cloud service providers to maintain security hygiene. That’s a lot of blind faith. 3. Governments have the desire, capacity and experience to tap into the cloud-service providers that hold the world’s data. The problem here is manifold. On the one hand, the government can access specific information based on a warrant. On the other hand, it is an entirely different matter to access everything on an as-needs basis, under cover of National Security Letters or their equivalent. Despite their best efforts to security screen and oversee intelligence and law enforcement operations, the government also falls prey to “trusted” staff performing unauthorized actions. These vulnerabilities impact the firm’s liability for data breaches, and the capacity to deliver on a promise of client confidentiality and privacy. In storing sensitive personal and other data, the firm is considered a data controller. As a data controller, the firm is subject to a variety of data protection laws and regulations. Such regulations increasingly create a costly burden to notify individuals affected by data breaches and to purchase several years of identity-theft protection. Emerging European laws mandate heavy fines for firms who violate data protection regulations. If you think the solution is not to use cloud, think again. The concerns outlined above have caused many organizations to have misgivings about adopting cloud-based solutions, thinking perhaps that an on premise solution (a server running in your office) are safer. Unfortunately, that is not the case. Your office or server room isn’t nearly as secure as an access-controlled data center. CloudMask: a silver lining for SaaS CloudMask addresses these vulnerabilities in a way that enables executives to immunize their firms against data- breaches, differentiate by offering highly secure data management and communications, and use economical cloud services with confidence. The CloudMask Approach: CloudMask can provide SaaS users with an easy-to-install browser extension that automatically masks sensitive data before it enters the 256-bit encryption channel to the data center. When that data arrives at the data center where the 256-bit protection ends, CloudMask data stays masked. This process also works in reverse, as in the case when the user requests sensitive data. Here the masked data is double- encrypted as it moves through the secured communications channel. When it arrives in the browser, the 256-bit encryption is removed, and CloudMask seamlessly unmasks to present the data in the clear. Alongside controlling users and their access rights, practice management account owners/administrators can have the capacity to select specific fields to be masked. Not all data needs to be masked and protected, but data categorized as sensitive personal data, personally identifying, or otherwise confidential, can be selected for automated, seamless masking and unmasking.
  • 4. From a functional perspective, CloudMask resolves the concerns that executives might have with respect to using SaaS applications: 1. Each user authorized to access the SaaS account installs a CloudMask browser extension that is activated through a simple process generating the personal, private and public keys required for the encryption process. What’s more, the extension can be installed on multiple personal devices, each of which is personalized with a private key. Thus, even if a username and password are somehow compromised, which under normal circumstances would allow anyone anywhere in the world to log into the account and see data in the clear, the unauthorized user cannot do so without access to the specific devices configured with the personalized browser extension. 2. The data stored under care of the data center remains masked while at rest or in motion. Neither the practice management SaaS vendor nor CloudMask administrators nor data center administrators have keys that can be used to unmask the data. If the data center suffers a breach (e.g., an unauthorized insider penetrates the database, or a government agency serves a National Security Letter), data the user has designated as sensitive remains protected. 3. The data stored under care of the data center is masked in such a way (“tokenization”) that anonymizes what was previously sensitive data. Thus, even if that data is stolen, it is no longer considered sensitive personal information or personally identifying information, so it no longer falls under data protection regulations or requirements. In other words, breaches of systems holding tokenized data do not trigger the costly response and remediation efforts associated with breaches of systems holding sensitive personal information. The Technical Story A separate e-book explains the technical details behind this process and the software that automates it, as well as describing the benefits of encrypting and tokenizing data, which we collectively refer to as “masking.” It also provides a brief explanation of the well-established public/private key methods used by the encryption process. Grounded Confidence CloudMask is unique in having its “CloudMask engine” certified through a Common Criteria for Information Technology Security Evaluation (Common Criteria) process, which is used by twenty-six federal governments to evaluate security products for their own use. The process of independent evaluation assesses whether a product’s functional claims live up to the way it is coded and performs. Many products claim to be “bank-grade” or “military-grade,” both of which are subjective assessments. CloudMask is the only data-masking product capable of working with SaaS offers to achieve Common Criteria certification. More expensive competitors like Cipher Cloud and Ionic have not achieved such objective criteria. Technical advisors can access CloudMask’s Common Criteria Assessment here. It’s easy to get started with CloudMask. Visit www.cloudmask.com