Boldon James Logo

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

Reading Time: 3 minutes A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More

Data Classification as a Catalyst for DLP

Reading Time: 2 minutes Data Loss Prevention (DLP) is different from most traditional data-centric security solutions in that it primarily focuses on internal, as opposed to external, threats. Unauthorized disclosure of internal data through any media, network mechanism or the accidental disclosure by… Read More

The 5 Steps to Effective Data Classification: Secure your data

Reading Time: 2 minutes Data that is classified according to its sensitivity instantly has a layer of protection surrounding it. The next task (having identified, discovered and classified your data) is to put in place the higher grade controls – in the form… Read More