Tag: data loss prevention


How to Keep Data Secure from Insider Threats

How to Keep Data Secure from Insider Threats

Just as online marketplaces made shoplifting worse by providing thieves with an easy avenue to sell their stolen goods, the dark web is raising risk by offering employees a venue for doing the dirty business of selling stolen information. According to a new report, the number of employees who did   Read More


Ransomware: When Cyber Crime Gets Personal

Ransomware: When Cyber Crime Gets Personal

In a July 2016 article, I talked about ransomware as a rapidly growing form of cyber crime. It was noted that cyber criminals went after businesses, literally hijacking their data and holding it hostage until a demand for money was met. Businesses were ripe targets because their deep pockets allowed   Read More


Data Protection Training: Yours

Data Protection Training: Yours

In this Internet age, many people fear that effective data protection and maintaining one’s privacy is nearly impossible. While it’s true that marketers, the government, and others are gathering and analyzing more data than ever about every individual, we can still exert some control over what’s out there, who’s tracking   Read More


A Straightforward Data Protection Definition

A Straightforward Data Protection Definition

In the digital technology era, information protection has become a top priority across all industries. The retail industry is no exception. The collection and use of data is now an integral part of day-to-day business practices and processes in the retail world – but what does data protection really entail?   Read More


The Fundamentals of Network Data Loss Prevention

The Fundamentals of Network Data Loss Prevention

It’s important to understand how criminals gain access to systems in order to better manage your organization’s network data loss prevention. While the playbook for network penetrations varies from attacker to attacker, there are some consistent patterns that emerge from each enterprise-level incident. Network penetrations can be broken down into   Read More