Mariann Utrosa

Recent Posts

PCI Compliance Does Not Equal Data Security

November 13, 2018|Mariann Utrosa

 

You passed your PCI audit after months of preparation and monumental costs, and achieved a certification that validates the same, but does a certificate actually mean that you’re secure?

There’s a lack of clarity between PCI Compliance and a compliant system or network being secure.

Read More

Storing Data In Multiple States

September 18, 2018|Mariann Utrosa

Data is in more places than ever before and cyber criminals tend to lurk in dark places, not often making their interests obvious or their presence visible.

Whether from insider threats or outsider attacks, a layered data security solution is critical since many traditional perimeter-based data protection mechanisms have been proven to fail when employed alone.

Data in Transit and Data at Rest are both described within security best practices which suggest encrypting such files, but what about their mutual and often overlooked counterpart: Data in Use?

Read More

Insider Threats in Cyber Security

February 03, 2018|Mariann Utrosa

 

An insider threat is arguably the single greatest and most damaging security concern that an organization can face.

Read More

Scalar named DataStealth 2017 Partner of the Year

January 03, 2018|Mariann Utrosa

 

TORONTO, CANADA - DECEMBER 21, 2017
Scalar named DataStealth 2017 Partner of the Year

Scalar Decisions (Scalar), the Toronto-headquartered IT solutions provider, announced today that they have been named DataStealth 2017 Partner of the Year, Enterprise Security Solutions. Scalar receives this award for their security offerings, technical expertise, and strong engagement with the DataStealth  team.

Read More

The Equifax Breach … How did it happen, and why was the fallout so fast and furious

September 18, 2017|Mariann Utrosa

 

HOW DID THIS HAPPEN?!

One of the world’s largest credit reporting companies, Equifax, was the subject of a data breach large enough in scale that security industry experts are branding it as “an unmitigated disaster”.

Read More

Does Encryption Cause A False Sense Of Security?

May 19, 2017|Mariann Utrosa

In the modern information landscape, between cloud, mobile and traditional (static) repositories, data has become far more accessible than ever before.  This convenience comes at a cost, though, because any technology or mechanism that makes your own data more available might also make it easier for a criminal or hacker to target and steal.

Read More

Storing Data In Multiple States

April 18, 2017|Mariann Utrosa

Data is in more places than ever before and cyber criminals tend to lurk in dark places, not often making their interests obvious or their presence visible. Whether from insider threats or outsider attacks, a layered data security solution is critical since many traditional perimeter-based data protection mechanisms have been proven to fail when employed alone.

Read More

Data at Rest, Data in Transit, and Encryption

April 03, 2017|Mariann Utrosa


Computer data spends most of it’s lifecycle being stored ‘at rest’, punctuated with brief periods ‘in transit’ between storage media.  Whether being stored locally on hard drives, servers and other physical media or stored remotely in the cloud … computer data is always either at rest or in transit. 

In either instance, encrypting your data can help protect it from hackers and theft, but over time and as hackers get smarter, and existing encryption techniques become progressively less effective.  How do you protect your data against the inevitable day when that very encryption just isn’t enough anymore?

Read More

Firewall? IDS? IDP? WAF? 

March 04, 2017|Mariann Utrosa

What does it all mean?

Read More

How To Protect Your Mobile Devices While Traveling

February 27, 2017|Mariann Utrosa

My friend’s 21 year old son set out on a 2 week hiking trip across part of South America.  After arriving in Cartagena, Columbia, it took all of 12 hours for his cell phone to be stolen.  Was his cell phone configured for maximum security to protect his data just in case it was lost or stolen … or did he have to call his Mom?

Read More