Resources

Blog

Orchestrating data security through effective data identification

Image As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “Age of Data”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

Image As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s...
Blog

Are your Zoom meetings vulnerable to data leakage?

Image It is estimated that there are more than 1.5 billion people worldwide working remotely today as a result of the current pandemic. Now that you have most, if not all, of your employees working remotely how do you minimize the risk of data breaches or inadvertent exposure of sensitive data? Protecting the network is a good first...
Blog

Fortra’s Data Classification Suite for Outlook on the web built on the Office Add-in platform

Image Fortra’s Data Classification Suite for Microsoft Outlook on the web is a security and governance add-in that enables organizations to ensure consistent and prudent handling of Outlook emails in real time. Fortra’s Data Classification Suite helps Outlook on the web users: Identify and classify emails based on data sensitivity ...
Blog

Data protection for remote workers

Image Working remotely has become the “new normal”, at least for the foreseeable future. Some 1.5 billion people are now working remotely. It seems companies overnight moved into a work-at-home reality, and many workplace experts predict that more and more organizations will continue to rely on remote workers after this pandemic has...
Blog

GDPR: Effective Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Image Many companies are currently in various phases of projects to comply with the European Union’s General Data Privacy Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in my view, over simplify solutions to issues that are raised. Rather than try...