Resources

On-Demand Webinar

Go Beyond One-Size-Fits-All Data Classification - Protect What Your Business Cares About

In today’s cybersecurity market, we are seeing more vendors than before offering solutions which claim to cover all your security needs under one roof.Sure, from a business efficiency point of view this may seem like a very tempting offer – but in reality is it all too good to be true? Many of the tools in a “one-size-fits-all” platform are essential, but packaged as they are for the standard...
Blog

What is Information Lifecycle Management? ILM Explained

Data is the cornerstone of the digital economy, but its constant generation creates challenges for organizations. One such challenge is storing and managing the data securely throughout its lifecycle–namely–creation, storage, processing, archival, and disposition.
Blog

PII Data Classification: 4 Best Practices

Getting personally identifiable information (PII) classification right is one of the first steps to having an effective data protection strategy. We break down four best practices in this blog.
Blog

What are Data Classification Levels?

How do you classify data in your organization? Conducting a data risk assessment and keeping compliance regulations top of mind are some of the first steps to helping an organization protect its data.
On-Demand Webinar

Why Pair Data Classification with DRM for End-to-End Data Security

The need to be able to share files and collaborate on data as a part of everyday working is crucial for businesses and their users. This internal and external collaboration, while necessary, presents several security challenges to IT. How much of what users are sharing is sensitive information? Where is it being stored and how is it being shared? Once you have the answers to these questions, how...
Blog

What is HIPAA Compliance?

Learn about the Health Insurance Portability and Accountability Act (HIPAA) and the requirements for HIPAA compliance in Data Protection 101, our series on the fundamentals of information security.
On-Demand Webinar

How Classification Defines Your Data Security Strategy

Digital transformation is driving a change in business processes from end to end and transforming volumes of data into sensitive data. Information security professionals are tasked with protecting this data, but they must first locate and understand it before they are able to prioritize data security programs. Data classification provides order to what can be chaos.Join Garrett Bekker, Senior...
On-Demand Webinar

Data Classification to Get Ahead of Compliance

Information security leaders struggle with allocating scarce resources. Without accurate guidance on what data is sensitive (confidential intellectual property or regulated data), or public, (product data sheets) this can be a guessing game. Data classification serves as the strategic road map to define and implement your compliance, security, and business strategy.Join Digital Guardian to learn...
Blog

The History of Data Breaches

As the wave of data breaches continues to crash down on companies, let’s take a look back at some of the largest and most damaging data breaches on record. Read on for a historical walk through breaches over time as well as resources for preventing data breaches.
Blog

High Drama in HIPAA Land: the CoPilot Breach

The leak late last year of information on more than 200,000 patients of CoPilot Provider Support Services was just the first act in what is proving to be a bizarre and mysterious HIPAA ‘whodunnit.’
Blog

Data Protection: Knowing is Half the Battle

Part two in our blog series on The Definitive Guide to Data Classification discusses the growing data deluge, what analysts are saying about security strategy, and how classification can bring order to your digital world.