5 Common Phishing Lures and How to Spot Them
Don’t take the bait! Learn about some of the most common phishing lures and how to identify them.
Different Types of Data Breaches & How To Prevent Them
Different types of data breaches will affect what type of protection you implement at your company. Understanding each can help you better prepare for an attack.
What Are The Most Common Types of Data Breaches?
The most common types of data breaches are:
Friday Five 10/28
Some high-profile threat actors ran into legal trouble this past week, but that isn’t stopping ransomware from running rampant. Catch up on all the latest in this week’s Friday Five.
Friday Five 10/21
Ransomware, info-stealing malware, and scams may be taking up the headlines, but a new, "tough" national cybersecurity strategy is right around the corner. Read about these stories and more in this week's Friday Five.
Friday Five 10/7
This week saw some good news around securing the midterm elections, warnings about IRS phishing scams, and new orders from CISA. Catch up in this week’s Friday Five!
State Data Breach Laws: Who To Notify and How Long You Have To Do It
How long do you have to report a data beach? In many scenarios it depends what state your organization resides in.
Secure File Sharing for Business Solutions
Files and documents are the primary tools for chronicling and sharing information. While helpful, collaborating like this can raise privacy concerns for businesses because documents may contain business secrets, proprietary information, and personally identifiable information (PII).
The most secure document collaboration tools for businesses prevent data loss, theft, and misuse while preserving their organization’s competitive advantage.
What is SOX Compliance? 2023 SOX Requirements & More
Learn about SOX compliance in Data Protection 101, our series on the fundamentals of data security.
Data Protection – Are We Focused on the Correct Areas?
How do you defend against data loss you can't see? The breaches you don't hear about? Our Wade Barisoff connects the dots between WWII airplanes and data protection to find the answer.
Friday Five 9/23
Experts are growing worried that the next cyber attack could come from an unlikely source, like an open source component or even your web browser’s spell checker. Read about this news and more in this week’s Friday Five!
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!