In The News
Decoding the data protection officer role under GDPRJune 13, 2017
This article outlines the role of a data protection officer under the GDPR.
What CISO certifications are the most important to have?November 14, 2016
Using Digital Guardian's research, SME Mike O. Villegas discusses the most effective combination of CISO credentials.
Podcast: With Ransomware - Never Pay The Ransom!March 14, 2016
Thomas Fischer, Global Privacy Advocate at Digital Guardian, explains why ransomware is a huge problem for businesses these days and why paying to get access to your encrypted data is a bad idea in this podcast.
Report: Sports Direct breached, data stolen, staff left in darkFebruary 8, 2017
The UK's largest sports retailer was apparently breached in Autumn 2016. Thomas Fischer and others comment on the story.
Mossack Fonseca hack exposes financial underworld of the rich and famousApril 4, 2016
Panama Papers leak exposes how thousands of shell companies have hidden money for tax evasion. Luke Brown, VP and GM EMEA, India, and LATAM at Digital Guardian, stresses the importance of law firms having strong data protection solutions in place.
Parent Firm of Ashley Madison Faces Extinction Level HackJuly 20, 2015
Large amounts of data have been stolen from Ashley Madison; "This is an organization that relies on discretion and its clearly not meeting the requirements to provide both security and privacy that it brands itself on", Pete Tyrrell, the Chief Operating Officer says in an e-mail statement. Read more to learn what the security ledger has to say about this hack.
Data Protection in the DarkJanuary 2, 2014
Peter Tyrrell for SC Magazine In an age of rampant malware attacks, in an era when companies may soon be liable for ignoring their cyber risk, at a time when firms are talking about insider attacks, data breaches and cyber crime every day…most IT security departments are still flying blind.
They have little or no data visibility or risk context. So they don't know what sensitive data exists or where it is located, what user is taking what action, where data is going or what controls they need to mitigate that risk. That is a lot of unknowns – and this is in companies that have data protection programs. In spite of the myriad solutions available to help enterprises protect their most valued data, most firms never face the most basic reality of data protection: If you can't see it, you can't protect it.
Four Tips to Help Clients Guard Against Insider ThreatsMay 22, 2017
So what exactly is an insider threat and how can an MSP become an expert at preventing it?