What Is File Security? Best Practices & Tools for Security
File security is integral to effective cybersecurity. In today's blog, we dig into the difference between file security and data security, best practices, and tools to implement for file security.
USB Security: How to Prevent Data Loss and Stop Malware
Graeme Batsman, a Senior Security Consultant with Fortra’s Professional Services team, gives a primer on all things USB: How to limit data ingress, egress, and other technical controls that can be implemented to mitigate risk.
What Is Code Encryption and How Does It Work?
What is code encryption? In this blog we describe the benefits of code encryption, how it differs from code obfuscation, and how it relates to data loss prevention.
What To Look for in a HIPAA-Compliant Email Provider
Whether you work for a doctor's office, healthcare organization, or just find yourself handling protected health information or ePHI, this blog breaks down what to look for in a HIPAA-compliant email service provider.
Data Protection – Are We Focused on the Correct Areas?
How do you defend against data loss you can't see? The breaches you don't hear about? Our Wade Barisoff connects the dots between WWII airplanes and data protection to find the answer.
Friday Five 2/12
A hack of a water treatment plant, SIM swapping used on celebrities, and a popular barcode app turned into malware - catch up on all of the week's infosec news with the Friday Five!
Friday Five 1/15
Deepfakes, ransomware tactics, and Signal clones - catch up on all of the week's infosec news with the Friday Five!
NSA Provides Direction on Eliminating Obsolete Encryption Protocols
Eliminating old, out-of-date encryption protocols can protect sensitive and valuable data from being accessed by adversaries, the NSA reiterated this week.
Friday Five 11/13
Cyber Command trolling, end-to-end encryption debates, and stolen source code - catch up on all the week's infosec news with the Friday Five!
Sign Up For Updates
Thank you for subscribing!