Network vs Endpoint DLP and Data Classification

Reading Time: 4 minutes Data loss is a constant threat to businesses, and the risk it comes with is not just a monetary one from breaching regulatory requirements, but perhaps far more costly in the long run is the potential reputational damage. When… Read More

The User-Driven Approach: 3 Main Benefits

Reading Time: 2 minutes We’ve seen the introduction to user-driven security, and the three main steps to implementing a user-driven approach to security. The last instalment of this three part series covers the three main benefits to your organisation: 1. Reduces Risk of… Read More

HelpSystems’ Robust Growth Draws New Investment from Harvest Partners SCF, LP

User-Driven Security: Transforming People Into Security Assets

Reading Time: 2 minutes Artificial Intelligence, User Behaviour Analytics, Zero-Trust… these are the buzzwords the security industry is currently dominated by. The developments to cyber security technology which have been made over the last few years are incredible, developments that are absolutely essential… Read More

Employees Generating Data

How Can Local Authorities Minimise The Risk Of Data Breaches?

Reading Time: 3 minutes Data breaches are catastrophic for any industry, but particularly in local authorities where consumer trust is paramount. The reputational damage to an organisation can be terminal. One in four councils breached Over a quarter of all UK councils have had… Read More

The NIST CSF Framework – What Does It Mean For Healthcare?

Reading Time: 3 minutes NIST, the National Institute of Standards and Technology, is a non-regulatory federal agency of the U.S. Commerce Department. Established in 1901, NIST was designed to promote innovation and competitiveness by advancing standards. And in February 2013, the United States… Read More