Cyber Resilience Insights

SUBSCRIBE NOW

Email Security, Archive and Data Protection, Security Awareness Training, Web Security
12 Cybersecurity Best Practices to Adopt in 2021

Every organization is vulnerable to increasingly damaging cyberthreats, but best practices… Read More >

Every organization is vulnerable to increasingly damaging cyberthreats, but best practices can help them mitigate the risks and their overall impact. Key Points: Increased digitization has created both unsurpassed opportunity and unrivaled risk for all organizations in 2021. Smaller and newer busin… Read More >

Stephanie Overby

by Stephanie Overby

Contributing Writer

Posted Jul 28, 2021

Archive and Data Protection
POPIA Poses Privacy Conundrum: How to Archive Email?

South Africa’s New Priva… Read More >

South Africa’s New Privacy Law Requires Data Archives That Prevent Tampering Yet At The Same Time Allow Correction… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Jul 21, 2021

Archive and Data Protection
Data Encryption: How to Protect Data in Transit, Data in Use and Data at Rest

With data growing in volume and scope, companies need to know the best encryption methods … Read More >

With data growing in volume and scope, companies need to know the best encryption methods for the three states of data to keep their information secure.   Key Points Data encryption is a core component of modern data protection strategy, helping businesses protect data in transit, in use and a… Read More >

Daniel Argintaru

by Daniel Argintaru

Contributing Writer

Posted Jul 22, 2021

Archive and Data Protection
Episode #10 of Phishy Business: Escaping ‘Zoom fatigue’…

Working together and collabora… Read More >

Working together and collaborating securely is a common challenge for companies today.  A full day ahead of meetin… Read More >

Nick Deen

by Nick Deen

Senior Marketing Manager

Posted Jul 02, 2021

Email Security, Archive and Data Protection
South Africa’s POPIA Privacy Rules vs. Ransomware

As South Africa’s data privacy law takes effect on July 1, one of companies’ b… Read More >

As South Africa’s data privacy law takes effect on July 1, one of companies’ biggest challenges will be safeguarding personal information against ransomware. Key Points: Some South African companies are better prepared than others to meet POPIA’s July 1 deadline to protect citizen… Read More >

Karen Lynch

by Karen Lynch

Contributing Writer

Posted Jun 28, 2021

Archive and Data Protection
PCI Compliance Guide

The PCI Data Security Standard… Read More >

The PCI Data Security Standard is used worldwide by financial services companies and other businesses involved in paymen… Read More >

Mike Azzara

by Mike Azzara

Contributing Writer

Posted Jun 09, 2021

Popular Posts

Older Posts

Archive and Data Protection

Collaboration Tools: Many Benefits — And New Security Risks

Since the start of the pandemic, business use of collaboration tools has soared — bringing new security and compliance challenges. Key Points: Collaboration tools like MS Teams and Zoom are contributing greatly to employee productivity &m…

Read More >

Archive and Data Protection

Three Common (and Risky) POPIA Myths Debunked

The grace period for POPIA compliance will soon end in South Africa. We did some myth busting to ensure you’re adequately prepared. Key Points: Some common misconceptions about POPIA could be putting your organisation at legal and financial ri…

Read More >

Archive and Data Protection

Going Beyond Email: Secure Collaboration Tools

Email remains the biggest source of online attacks, but the surge in remote work has forced IT to look beyond email for cybersecurity, toward collaboration tools. Key Points: The global pandemic made almost everyone a work-from-home employee overnig…

Read More >

Email Security, Archive and Data Protection

Episode #6 of Phishy Business: Curious Cases of Identity Theft with Maria Genova

Maria Genova and Dr. Kiri Addison share lessons learned from unfortunate instances of identity theft.  Did you know it’s possible to be imprisoned on a database, but not in actual reality? While the idea may seem strange, this is the case…

Read More >

categories

Read More >

View More

Popular Posts