Blogs

blog post
Why data footprint reduction is essential to data security and how to do it right

It’s nearly impossible to overstate how rapidly the data universe is growing. While most people still think enterprise data is…

Data Privacy Data Protection Data Security

blog post
Tax Security Checklist: How to file safely and avoid data theft

In 2020, the IRS exposed $2.3 billion in tax fraud, ranging from identity theft to refund fraud. The agency also…

Data Protection Data Security

blog post
A 2020 Review: Data privacy and security trends

The demands of data privacy and security have been changing quickly for the past several years, and 2020 was no…

Data Privacy Data Security

blog post
5 emerging telehealth data security risks—and what to do about them

Telehealth is on the rise, bringing with it an array of incredible benefits but also underscoring a number of emerging…

Data Security

blog post
How to refocus your cybersecurity team’s assumption of compromise paradox to a data protection model

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Data Breach Data Protection Data Security

blog post
Healthcare under attack: How backup systems make or break your response to ransomware

When the global pandemic began to impact the U.S. with shut downs and concerns about the ability for medical facilities…

Data Breach Data Privacy Data Protection Data Security

blog post
Focus on changing perimeter protection

October is Cybersecurity Awareness Month. Securing data will likely be a key theme to the month, as data privacy laws…

Data Privacy Data Security

blog post
Mr. Jeff Horne, Chief Security Officer at Ordr talks about security issues in our daily life and home

We promise you will never look at your appliances the same way again after listening to this episode. This is…

Cybersecurity Data Security Personal Data