Boldon James - HelpSystems Company Logo

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

HHS: Data Protection Among Best Practices For Healthcare Cybersecurity

Reading Time: 3 minutes A set of cybersecurity best practices recently published by the Department of Health and Human Services (HHS) looks at five of the biggest cyber threats to the healthcare industry and how to best mitigate them. The U.S. Department of… Read More

Data Classification as a Catalyst for DLP

Reading Time: 2 minutes Data Loss Prevention (DLP) is different from most traditional data-centric security solutions in that it primarily focuses on internal, as opposed to external, threats. Unauthorized disclosure of internal data through any media, network mechanism or the accidental disclosure by… Read More

The 5 Steps to Effective Data Classification: Secure your data

Reading Time: 2 minutes Data that is classified according to its sensitivity instantly has a layer of protection surrounding it. The next task (having identified, discovered and classified your data) is to put in place the higher grade controls – in the form… Read More

Employees: Your Biggest Threat to Security

Reading Time: 3 minutes Most organisations still believe that hackers and external threats are the biggest risk to their business, but what if the threat comes from within? According to data security company Code 42, 78% of security professionals state that negligent and careless… Read More