DataSecurity Plus | March 6, 2025Top tips: 5 potential use cases of 6G networks Top tips is a weekly column where we highlight what’s trending in the tech world and list...
DataSecurity Plus | October 8, 2024The states of data, Part 3: Data in use and why you need to keep an eye on file activities In our previous blog, The states of data, Part 2: Why visibility is key for protecting...
DataSecurity Plus | September 17, 2024The states of data, Part 1: Why you should protect data at rest, in use, and in motion What do Morgan Stanley, Samsung, and a New York credit union all have in common? They...
DataSecurity Plus | September 3, 2024Data classification: The fundamental requirement of successful DLP programs The way we store data has undergone a dramatic shift. From good ol' floppy disks to...
DataSecurity Plus | July 26, 2024Data security threats: How to safeguard your data from modern pirates [Free e-book] To stay safe from modern-day pirates, you need elaborate, multi-layered security measures...
DataSecurity Plus | March 20, 2024USB review, Part 2: How to manage USB devices In this two-part series, the first blog demonstrates how USB devices can be conduits of...
DataSecurity Plus | January 17, 2024USB review, Part 1: How are USB flash drives a security risk? We've all used pocket-sized USB drives to store and transfer data. We've also lost them...
DataSecurity Plus | October 11, 2023Access granted: Mastering the art of permissions Back in the 20th century, cyberattacks were harder to execute because most computers were...
DataSecurity Plus | February 24, 2022Is your sensitive data overexposed? 76% of IT security leaders experienced data breaches involving the loss or theft of...
DataSecurity Plus | November 11, 2021Bring down data storage costs by getting rid of obsolete data [Savings estimator] Redundant, obsolete, and trivial (ROT) data refers to information housed in data...
DataSecurity Plus | June 28, 2021Why companies need URL filtering for enhanced cloud protection The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with...
DataSecurity Plus | May 19, 2021Healthcare cybersecurity: Our 6-step plan to secure healthcare data The HIPAA Journal reported that "2020 was the worst ever year for healthcare industry data...