Reading Time: 2 minutes All roads lead to Rome, or at least that is what the proverb says, meaning no matter what route you take, you will always end up with the same result. Unfortunately, this isn’t something you can say for sensitive… Read More

Reading Time: 3 minutes A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organisations often have a written policy that’s available on their company intranet and handed to new… Read More

Reading Time: 2 minutes The primary reason most organisations look at classifying the data they create and handle is to control access to sensitive information, driven by the need to manage security risk and comply with regulations, such as GDPR. However, this scope… Read More

Reading Time: 3 minutes Not all data requires the same level of encryption. Use data classification to gauge your security needs, including for workloads that span on-premises and cloud environments. Data encryption might seem like a given in any IT security strategy, but… Read More