Blog

Blog

4 Steps to Keeping Patient Data in the Cloud Protected

Once patient data has been migrated to the cloud securely, it will require ongoing protection against loss or unauthorized access. Follow these four steps to keep cloud-based data protected in an ongoing basis.
Blog

Terabytes of Data Stolen? The Lessons of Operation Iron Tiger

A report from the security firm Trend Micro claims that targeted attacks against US firms have resulted in the theft of intellectual property on a massive scale – including 58 gigabytes of data from a single target. But how?
Blog

5 Steps to Prevent Sensitive Data Loss

Ashley Madison is just the latest company to lose gigabytes of customer data in a high profile breach. How can companies protect their information in the face of cyberattacks?
Blog

7 Ways to Lose Sensitive Data

With trends like BYOD, workforce mobility, and the adoption of cloud and web applications for business, there are more opportunities for sensitive data loss than ever before. Here are our top 7 ways that sensitive data is most commonly lost as well as tips for preventing data loss.
Blog

The Art of Stealing Terabytes

How did hackers manage to extract terabytes of data from the network of Sony Pictures without direct, physical access? It may have been easier than you would think.