Cyber Resilience Insights

SUBSCRIBE NOW

Email Security, Archive and Data Protection
What Is IT Risk Management?

Understand information technology (IT) risk management and strategies to reduce your compa… Read More >

Understand information technology (IT) risk management and strategies to reduce your company’s exposure to cyberattacks, outages and other incidents. Key Points: IT risk management helps protect your business’s critical interests. A formal risk management framework identifies threats an… Read More >

by Jeffrey Schwartz

Contributing Writer

Posted Oct 20, 2021

Archive and Data Protection
Collaboration Tools Pose Challenges for E-Discovery

The use of collaboration tools… Read More >

The use of collaboration tools is complicating e-discovery, even as corporate legal teams become more dependent on this … Read More >

Elliot Kass

by Elliot Kass

Contributing Writer

Posted Oct 04, 2021

Archive and Data Protection
Data Security and Archiving for Microsoft Teams

To compensate for the security limitations of Microsoft’s popular collaboration plat… Read More >

To compensate for the security limitations of Microsoft’s popular collaboration platform, users need a third-party solution to protect their data. Key Points: The adoption of Microsoft Teams has exploded since the COVID-19 pandemic began and millions of office workers started working remotely… Read More >

Elliot Kass

by Elliot Kass

Contributing Writer

Posted Aug 23, 2021

Email Security, Archive and Data Protection, Security Awareness Training, Web Security
12 Cybersecurity Best Practices to Adopt in 2021

Every organization is vulnerab… Read More >

Every organization is vulnerable to increasingly damaging cyberthreats, but best practices can help them mitigate the ri… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Jul 28, 2021

Archive and Data Protection
POPIA Poses Privacy Conundrum: How to Archive Email?

South Africa’s New Privacy Law Requires Data Archives That Prevent Tampering Yet At … Read More >

South Africa’s New Privacy Law Requires Data Archives That Prevent Tampering Yet At The Same Time Allow Corrections. Key Points: Companies must safeguard South African citizens’ personal information from unauthorized access and tampering under the new POPIA law. The law also permits ind… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Jul 21, 2021

Archive and Data Protection
Data Encryption: How to Protect Data in Transit, Data i…

With data growing in volume an… Read More >

With data growing in volume and scope, companies need to know the best encryption methods for the three states of data t… Read More >

Daniel Argintaru

by Daniel Argintaru

Contributing Writer

Posted Jul 22, 2021

Popular Posts

Older Posts

Archive and Data Protection

Falling Short? Data Protection and Microsoft Teams

A new white paper examines the archiving and data protection challenges created by the widespread adoption of Microsoft’s popular collaboration platform. Key Points: The adoption of Microsoft Teams has exploded over the past year, as the pande…

Read More >

Archive and Data Protection

Episode #10 of Phishy Business: Escaping ‘Zoom fatigue’ – how to organise new ways of working effectively

Working together and collaborating securely is a common challenge for companies today.  A full day ahead of meetings looms on the horizon as you sip your morning coffee, a familiar scenario for most of us. The majority of these discussions will…

Read More >

Email Security, Archive and Data Protection

South Africa’s POPIA Privacy Rules vs. Ransomware

As South Africa’s data privacy law takes effect on July 1, one of companies’ biggest challenges will be safeguarding personal information against ransomware. Key Points: Some South African companies are better prepared than others to mee…

Read More >

Archive and Data Protection

PCI Compliance Guide

The PCI Data Security Standard is used worldwide by financial services companies and other businesses involved in payment transactions. Here's how to maintain PCI compliance. Key Points: The PCI Data Security Standard applies to any company that han…

Read More >

categories

Read More >

View More

Popular Posts