Blogs

blog post
How to comply with GDPR data retention requirements

Does your company collect personal data from European Union citizens? If so, you’re subject to the General Data Protection Regulation…

Compliance & Regulations

blog post
What is an Insider Attack?

Insider cyber attacks are a common cause of data breaches, and the volume of attacks, as well as the overall…

Data Security

blog post
Stopping Ransomware in its Tracks

Let’s face it: ransomware isn’t going anywhere anytime soon. The startling pace of data creation and consumption provides attackers with…

Data Protection

blog post
Ransomware Prevention Checklist

The number of ransomware attacks in just the first half of 2021 was nearly double the total for 2020. As…

Data Protection Data Security

blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Data Management & Governance Sensitive Data

blog post
CJIS: Finding the right solution to a tricky compliance situation

As of January 2021, the FBI is moving towards the more sophisticated method of data exchange known as the National…

Data Security

blog post
Data Loss Prevention Strategy for Remote Workers

With the rise of remote work, we’re seeing more organizations roll out permanent work-from-home plans or provide the flexibility for…

Data Protection

blog post
Why is endpoint data protection so important?

Enterprises across all industries operate on consumer data. In addition to being necessary for completing day-to-day business functions, this data…

Data Protection