The states of data, Part 3: Data in use and why you need to keep an eye on file activities

In our previous blog, The states of data, Part 2: Why visibility is key for protecting data at rest, we discussed the importance of discovering...

DataSecurity Plus , DataSecurity Plus 4 min read Read

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They aren’t of the same scale, do not cater to...

DataSecurity Plus 2 min read Read

Data classification: The fundamental requirement of successful DLP programs

The way we store data has undergone a dramatic shift. From good ol’ floppy disks   to today’s cloud storage solutions, advancements in storage have slashed costs...

DataSecurity Plus 4 min read Read

Data security threats: How to safeguard your data from modern pirates [Free e-book]

To stay safe from modern-day pirates, you need elaborate, multi-layered security measures. With the recent exponential increase in data generation and storage requirements, threats to...

DataSecurity Plus 2 min read Read

USB review, Part 2: How to manage USB devices

In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...

DataSecurity Plus 4 min read Read

USB review, Part 1: How are USB flash drives a security risk?

We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied...

DataSecurity Plus 4 min read Read

Access granted: Mastering the art of permissions

Back in the 20th century, cyberattacks were harder to execute because most computers were not networked, the internet wasn’t really a thing, only a few...

DataSecurity Plus 3 min read Read

Is your sensitive data overexposed?

76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...

DataSecurity Plus 3 min read Read

Bring down data storage costs by getting rid of obsolete data [Savings estimator]

Redundant, obsolete, and trivial (ROT) data refers to information housed in data repositories that is either not in use or not needed in current business operations. These are...

DataSecurity Plus 3 min read Read