Blogs
A Deep Dive into the Ohio Data Protection Act – Your Questions, Answered.
NOTE: While the webcast and our published materials are an analysis of this new law, they are not legal advice;…
By Ryan Tully on February 19, 2019
Compliance & Regulations
Oklahoma Breach Exposes Decades Old Records
In December of last year, the Oklahoma Securities Commission learned that millions of sensitive files were left publicly exposed on…
By Ryan Tully on February 16, 2019
Data Breach
Data at Rest, Data Loss Prevention for Healthcare
Healthcare Data Security – Data Loss Prevention In the healthcare industry, there is a ton of personal information stored –…
By Ryan Tully on February 14, 2019
Data Management & Governance Data Protection Sensitive Data
Another Casualty of Prevalent PHI Breaches
Valley Hope Association’s mission is to help people overcome their dependence on alcohol and drugs. At their 16 addiction treatment…
By Ryan Tully on February 14, 2019
Data Protection Sensitive Data
6 Steps for Protecting Your Intellectual Property
With all the focus on compliance requirements—PII, PCI-DSS, HIPAA, GDPR, and a plethora of other regulations—one of your company’s most…
By Ryan Tully on February 13, 2019
Sensitive Data
How Organizations Need to React to New Data Privacy Challenges
[Scott Giordano] Appeared in Information Management With all of the attention now being paid to data privacy, many Americans are…
By Ryan Tully on February 12, 2019
Data Privacy