Advertisement

Data Security When Working Remotely

Click to learn more about author Daniel Santry. The global pandemic has changed the way some businesses operate almost beyond recognition. Many company headquarters have been all but empty throughout the majority of 2020, and, although the situation is slowly changing in many parts of the world, remote working has firmly established itself. Modern communication […]

How Healthcare Organizations Can Remedy Data Protection and Availability with Cloud DR

Click to learn more about author Don Boxley. With the COVID-19 pandemic showing few signs of slowing, together with virtually every reputable health authority warning of a second wave this Fall, most industries are reevaluating their data protection, availability, and disaster recovery (DR) strategies. Not surprisingly, healthcare is chief among those taking a hard look […]

How Does IoT Security Impact PCI Compliance?

Click to learn more about author Rob Chapman. From self-driving vehicles to the food lockers at your local convenience store, the Internet of Things (IoT) is virtually everywhere. In fact, it’s one of those rare technology trends that has not only lived up to big expectations but continued to surpass them. Everyone from industry analysts […]

The Fundamentals of Data Anonymization and Protection

Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]

Eight Key Steps to Comply with CCPA: A 2020 Checklist

Click here to learn more about Anas Baig. The California Consumer Privacy Act (CCPA) has gone into effect, and organizations are looking for ways to comply with this regulation as efficiently and cost-effectively possible. Several frameworks can be used to help narrow down the route you should take when trying to comply with the CCPA. […]

How to Protect Endpoints for Remote Employees

Click to learn more about author JG Heithcock. The worldwide pandemic is forcing employees to work from home in a distributed environment for businesses across the world. According to an April 2020 survey of 25,000 U.S. workers, over half of the workforce in the United States is now working remotely. These are unprecedented times, and […]