Boldon James Logo

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

Boldon James Data Classification Solution Extends Forcepoint’s Next-Generation Data Protection Portfolio

Reading Time: 2 minutes Farnborough, UK– Sept 16, 2019 – Boldon James today announced the addition of the company’s Classifier product suite to Forcepoint’s data protection portfolio. Simplifying the purchase process for customers, Classifier is immediately available through the Forcepoint channel, from a… Read More

5 steps to data classification graphic

The 5 Steps to Effective Data Classification: Classify your data

Reading Time: 3 minutes A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organisations often have a written policy that’s available on their company intranet and handed to new… Read More

Data Breach Trends – Are You In The Know?

Reading Time: 3 minutes Data breaches are on the rise – it’s a fact. In times like these, it’s important to ask yourself – are you being vigilant? And crucially, are you in the know? The following statistics have been taken from the… Read More