Step-by-Step Employee Training: PII Protection Awareness

Cole PrudenData Protection, Personally Identifiable Information, Reducing Employee Negligence, Sensitive Data Protection

Step-by-Step Employee Training: PII Protection Awareness

As much as 90% of security breaches and data leaks are caused by human error. Follow these 5 Steps to hold your own employee training on PII Protection and Cyber Awareness. Introduction to PII Personally Identifiable Information, or PII, must be a household acronym for all employees. They need to be able to recognize it immediately, as well as show … Read More

Redaction

Cole PrudenData Protection, De-Identification, Personally Identifiable Information, Sensitive Data Protection

Redaction

The best way to safeguard sensitive data is to keep it out of sight — and out of reach.  The 3rd and final section in this 3-part mini-series explores Data Redaction and the irreversible role it plays in PII protection. Let’s get into it. What is Data Redaction? Ever see a spy movie featuring ‘classified’ files? Pages and pages of … Read More

Data Masking

Cole PrudenData Protection, De-Identification, Personally Identifiable Information, Sensitive Data Protection

Data Masking

The best way to safeguard sensitive data is to keep it out of sight — and out of reach.  Part 2 of this 3-part mini-series explores Data Masking and the irreversible role it plays in PII protection. Let’s get into it. What is Data Masking Data masking is a non-reversible transformation process that “masks” sensitive data by partially or fully … Read More

Data De-Identification

Cole PrudenData Protection, De-Identification, Personally Identifiable Information, Sensitive Data Protection

Data De-Identification

The best way to safeguard sensitive data is to keep it out of sight — and out of reach. This 3-part mini-series explores the 3 BEST anonymization tactics for processing and storing protected information. Let’s learn how. What is Data De-Identification? The first TOP method of data anonymization is called Data De-Identification. In layman’s terms, data de-identification is the process … Read More

Beginner’s Guide to POPIA

Cole PrudenData Protection, GDPR

Beginner’s Guide to POPIA

Over the past two decades, the online world has experienced a true revolution in data protection. But each corner of the world handles PII differently, so put on your sunglasses and safari hat because we’re headed to South Africa!

Ground Labs Users Switch to PII Tools for GDPR Compliance

Cole PrudenCompliance, GDPR, GDPR Compliance, PII

Ground Labs Users Switch to PII Tools for GDPR Compliance

Still Overpaying for Sensitive Data Discovery & Remediation? Unlimited workstations, unlimited data allowance, unique data discovery features, and, most importantly, all-in-one pricing to SIGNIFICANTLY REDUCE YOUR COSTS. Complete GDPR Compliance With Ground Labs’ latest price increase, it’s no wonder customers are looking for an equally reliable and more cost-effective alternative. But the key is to pay less while also achieving … Read More

Ground Labs Users Switch to PII Tools for PCI Compliance

Cole PrudenCompliance, PCI DSS, PII

Ground Labs Users Switch to PII Tools for PCI Compliance

Still Overpaying for Payment Card Data Discovery & Remediation? Unlimited workstations, unlimited data allowance, unique data discovery features, and, most importantly, all-in-one pricing to SIGNIFICANTLY REDUCE YOUR COSTS. Complete PCI DSS Compliance With Ground Labs’ latest price increase, it’s no wonder customers are looking for an equally reliable but more cost-effective alternative. The key is to pay less while also … Read More

PII Examples

Cole PrudenPersonal Data, PII, PII Examples

PII Examples

Below you’ll find an example list of Personally Identifiable Information, or PII, to help you better understand how it can appear in the real world. You’ll also find FREE downloadable files attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, … Read More

CCPA & PII Discovery Requirements

Cole PrudenCompliance, Sensitive Data, Sensitive Information

CCPA & PII Discovery Requirements

The California Consumer Privacy Act puts consumers back in the driver’s seat of their own sensitive information, while also requiring a lot from businesses. Let’s discuss the details. CCPA In 2018, the State of California Department of Justice approved the implementation of the California Consumer Privacy Act. In many ways, this data privacy regulation is similar to the GDPR, however, … Read More

HIPAA Complaint Detection

Cole PrudenCompliance, HIPAA Compliance

HIPAA Complaint Detection

Identifying potential HIPAA violations is paramount to achieving and maintaining HIPAA compliance, avoiding potential fines, and protecting people’s data. Let’s learn how. HIPAA Compliance Because it deals with data subjects’ private health-related information, the Health Insurance Portability and Accountability Act, or HIPAA, is one of the strictest regulations. Violations can result in fines upwards of $50,000 in a civil proceeding, … Read More