(Ghostwritten for Cristina Pop) Protected health information (PHI) is a specific type of personally identifiable information (PII) that relates to medical records as well as any past, present, or future information about an individual’s physical or mental health. This specific type of PII is covered by the Health Insurance Portability and Accountability Act of 1996 … Continue reading 4 ways DLP helps secure PHI
(Ghostwritten for Roman Foeckl) Business leaders interested in professional IT solutions for enterprises will likely turn to the technological research and consulting company Gartner, Inc. and their famous Magic Quadrant reports before making any purchases. For many industries and specializations, the Magic Quadrant is one of the primary tools used for the initial evaluation of … Continue reading The Story of the Missing Gartner Magic Quadrant for Enterprise DLP
(Ghostwritten for Zoran Cocoara) In recent years, Slack became a de facto standard platform for business communications within business teams. Originally, it was a cloud service designed primarily for developers and IT personnel. However, now it is often the selected means of collaboration amongst most departments in both young startups as well as established companies. … Continue reading Slack security concerns and how DLP helps overcome them
(Ghostwritten for Roman Foeckl) Just a decade or two ago, cybersecurity used to be a concern only for the most prominent market players. Today, in the age of digital transformation, everyone is on their toes, even the smallest businesses. Handling cybersecurity is no longer just about protecting yourself against viruses and spyware and occasional network … Continue reading Is there a disconnect between business leaders and security teams?
(Ghostwritten for Chris Roney) Data is the new gold. The value of sensitive information and personal data may not seem that great but its leakage is one of the most costly disasters for all types of organizations – businesses, governments, and other institutions. The lack of suitable data protection is an accident waiting to happen because cybercriminals … Continue reading 5 Recommendations for User Data Protection and Data Privacy
The automotive industry is one of the victims of the extremely rapid onset of the digital age. For a few decades, the car computer was just a fancy name for a very simple electronic control unit (ECU) monitoring the engine. The road vehicle would run fine with the computer turned off, it would just be … Continue reading Automotive cyber security standards: ISO/SAE 21434 and more
(Ghostwritten for Codina Sabau) The days when information security was far down the list of priorities are long over. In the age of cloud storage and SaaS providers, sensitive data is more accessible than ever but also more exposed and easier to lose if not properly protected. Recent world trends and events have also led … Continue reading How DLP can help you with ISO 27001 compliance
(Ghostwritten for Tim Deluca-Smith) Go back ten years, and there wasn’t a month that went by without reports of a USB memory stick containing customer PII being lost or stolen. Since that time, improved security awareness, and technology, have reduced such incidents. However, recent reports of a Japanese contractor who lost USB memory sticks containing the … Continue reading Yes, people are still losing data via USB memory sticks in 2022.