Network vs Endpoint DLP and Data Classification

Reading Time: 4 minutes Data loss is a constant threat to businesses, and the risk it comes with is not just a monetary one from breaching regulatory requirements, but perhaps far more costly in the long run is the potential reputational damage. When… Read More

The User-Driven Approach: 3 Main Steps

Reading Time: 2 minutes Following on from our introduction to user-driven security, and why people are seen as such a risk in business. We are now looking at the three main steps you can take to turn your people from a risk into… Read More

HelpSystems’ Robust Growth Draws New Investment from Harvest Partners SCF, LP

User-Driven Security: Transforming People Into Security Assets

Reading Time: 2 minutes Artificial Intelligence, User Behaviour Analytics, Zero-Trust… these are the buzzwords the security industry is currently dominated by. The developments to cyber security technology which have been made over the last few years are incredible, developments that are absolutely essential… Read More

The Balancing Act: Education vs Enforcement

Reading Time: 3 minutes Let’s face it – there are very few people in this world who like being told what to do. We often find that suddenly enforcing strict rules and big changes, in both social and working environments, is met with… Read More

Addressing the EU GDPR and New York Cybersecurity Requirements: 3 Keys to Success – Part 3

Reading Time: 3 minutes Following on from part one, and part two of this three part series, this week’s final instalment looks at Third-Party Risk… 3. Third-Party Risk Third parties can present your greatest area of risk exposure — both for data security,… Read More