Blogs

blog post
What is a data retention policy and should you have one?

In order to collect and process consumers’ sensitive data to fulfill both day-to-day and long-term business needs, companies must implement…

Data Protection Data Security

blog post
Understanding malicious insider threat examples to avoid an insider attack

In 2020, insider threats were responsible for 60% of data breaches. Insider threats occur when an employee’s privileged access is…

Data Security Sensitive Data

blog post
Spirion and RSAC Host U.S. Data Privacy Trailblazers Webcast

Panel Featuring State Legislators Explores Privacy-Forward Data Protection Compliance Strategies ST. PETERSBURG, FL―November 8, 2021― Spirion, a pioneer in data…

Data Security

blog post
How to comply with GDPR data retention requirements

Does your company collect personal data from European Union citizens? If so, you’re subject to the General Data Protection Regulation…

Compliance & Regulations

blog post
What is an Insider Attack?

Insider cyber attacks are a common cause of data breaches, and the volume of attacks, as well as the overall…

Data Security

blog post
Stopping Ransomware in its Tracks

Let’s face it: ransomware isn’t going anywhere anytime soon. The startling pace of data creation and consumption provides attackers with…

Data Protection

blog post
Ransomware Prevention Checklist

The number of ransomware attacks in just the first half of 2021 was nearly double the total for 2020. As…

Data Protection Data Security

blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Data Management & Governance Sensitive Data