In our previous blog, Data in use and why you need to keep an eye on file activities, we discussed why you should monitor how...
Search results for: DataSecurity Plus

Data security threats: How to safeguard your data from modern pirates [Free e-book]
To stay safe from modern-day pirates, you need elaborate, multi-layered security measures. With the recent exponential increase in data generation and storage requirements, threats to...

USB review, Part 2: How to manage USB devices
In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...

USB review, Part 1: How are USB flash drives a security risk?
We’ve all used pocket-sized USB drives to store and transfer data. We’ve also lost them countless times. USB sticks are a necessary convenience accompanied by complex and varied...
ManageEngine AD360 and Log360 bag the 2022 Cybersecurity Excellence Awards
ManageEngine kicks off the year on a high note as it bags the 2022 Cybersecurity Excellence Awards under various categories. To name a few, ManageEngine...

Is your sensitive data overexposed?
76% of IT security leaders experienced data breaches involving the loss or theft of sensitive information contained in documents or files. – Code42 2021 Data Exposure...

Bring down data storage costs by getting rid of obsolete data [Savings estimator]
Redundant, obsolete, and trivial (ROT) data refers to information housed in data repositories that is either not in use or not needed in current business operations. These are...

Why companies need URL filtering for enhanced cloud protection
The cloud landscape is rife with unsafe URLs and inappropriate content. This—coupled with the accelerated adoption of cloud applications in the workplace—has created an urgent...