Click to learn more about author Daniel Santry. The global pandemic has changed the way some businesses operate almost beyond recognition. Many company headquarters have been all but empty throughout the majority of 2020, and, although the situation is slowly changing in many parts of the world, remote working has firmly established itself. Modern communication […]
How Healthcare Organizations Can Remedy Data Protection and Availability with Cloud DR
Click to learn more about author Don Boxley. With the COVID-19 pandemic showing few signs of slowing, together with virtually every reputable health authority warning of a second wave this Fall, most industries are reevaluating their data protection, availability, and disaster recovery (DR) strategies. Not surprisingly, healthcare is chief among those taking a hard look […]
How Does IoT Security Impact PCI Compliance?
Click to learn more about author Rob Chapman. From self-driving vehicles to the food lockers at your local convenience store, the Internet of Things (IoT) is virtually everywhere. In fact, it’s one of those rare technology trends that has not only lived up to big expectations but continued to surpass them. Everyone from industry analysts […]
Data Lessons to Learn from Industries that Stay Strong During a Crisis
Click to learn more about author Samuel Bocetta. Amidst all the talk of lockdowns, quarantines, and a looming global economic crash, it can be easy to forget that some companies are doing pretty well during the current pandemic. Unlike previous economic crises, this crisis has led to a widespread change in working practices and has […]
Is Your Company Prepared to Address New Data Privacy Regulations?
Click to learn more about author Gerald Beuchelt. Two years have passed since the inception of the General Data Protection Regulation (GDPR). This legislation placed the privacy conversation front and center in capitals and board rooms around the world. Since then, we have seen a heightened sensibility around data privacy and security with over 100 […]
The Fundamentals of Data Anonymization and Protection
Click to learn more about author David Balaban. Data anonymization is a process aimed at eliminating personally identifiable clues so that it’s impracticable, or at least very challenging, to attribute this information to a specific individual. In this regard, the terms “de-identification” and “anonymization” denote virtually the same concept and may be used interchangeably. The […]
Eight Key Steps to Comply with CCPA: A 2020 Checklist
Click here to learn more about Anas Baig. The California Consumer Privacy Act (CCPA) has gone into effect, and organizations are looking for ways to comply with this regulation as efficiently and cost-effectively possible. Several frameworks can be used to help narrow down the route you should take when trying to comply with the CCPA. […]
Why You Should Go Beyond Checkbox PCI Compliance
Click to learn more about author Rob Chapman. One of the first books I ever read that wasn’t a school assignment was The 7 Habits of Highly Effective People by Stephen Covey. My father gave it to me shortly after he finished it, and it was the first real “grown-up” book I ever read. There […]
Ransomware Authors Go Beyond Malicious Encryption
Click to learn more about author David Balaban. The scourge of ransomware is mutating into a phenomenon with a two-pronged extortion plan at its core. Schemes used to rely solely on encryption making a victim’s data inaccessible, but a game-changing tweak in the “classic” attack chain took place in late 2019. A number of ransomware […]
How to Protect Endpoints for Remote Employees
Click to learn more about author JG Heithcock. The worldwide pandemic is forcing employees to work from home in a distributed environment for businesses across the world. According to an April 2020 survey of 25,000 U.S. workers, over half of the workforce in the United States is now working remotely. These are unprecedented times, and […]