Structured vs. Unstructured Data: A Comprehensive Guide
Learn about the difference between structured data and unstructured data and how to best protect it in Data Protection 101, our series on the fundamentals of information security.
What is a Data Protection Officer (DPO)?
Learn about the DPO's role in managing organizational data protection and overseeing GDPR compliance in Data Protection 101, our information security fundamentals series of materials.
A DEFINITION OF DATA PROTECTION OFFICER
A Data Protection Officer (DPO) is a dedicated business security role that is required by the General Data Protection Regulation (GDPR). Data Protection Officers are responsible for overseeing data protection strategy and implementation to ensure compliance with GDPR requirements.
5 Common Phishing Lures and How to Spot Them
Don’t take the bait! Learn about some of the most common phishing lures and how to identify them.
Different Types of Data Breaches & How To Prevent Them
Different types of data breaches will affect what type of protection you implement at your company. Understanding each can help you better prepare for an attack.
What Are The Most Common Types of Data Breaches?
The most common types of data breaches are:
Friday Five 10/28
Some high-profile threat actors ran into legal trouble this past week, but that isn’t stopping ransomware from running rampant. Catch up on all the latest in this week’s Friday Five.
Friday Five 10/21
Ransomware, info-stealing malware, and scams may be taking up the headlines, but a new, "tough" national cybersecurity strategy is right around the corner. Read about these stories and more in this week's Friday Five.
Friday Five 10/7
This week saw some good news around securing the midterm elections, warnings about IRS phishing scams, and new orders from CISA. Catch up in this week’s Friday Five!
State Data Breach Laws: Who To Notify and How Long You Have To Do It
How long do you have to report a data beach? In many scenarios it depends what state your organization resides in.
Secure File Sharing for Business Solutions
Files and documents are the primary tools for chronicling and sharing information. While helpful, collaborating like this can raise privacy concerns for businesses because documents may contain business secrets, proprietary information, and personally identifiable information (PII).
The most secure document collaboration tools for businesses prevent data loss, theft, and misuse while preserving their organization’s competitive advantage.
What is SOX Compliance? 2023 SOX Requirements & More
Learn about SOX compliance in Data Protection 101, our series on the fundamentals of data security.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!