A Beginner’s Guide to GLBA Compliance

Cole PrudenGLBA, Guides, Mandatory Data Compliance, PII, PII Auditing, Sensitive Data Discovery

A Beginner’s Guide to GLBA Compliance

The GLBA affects all financial institutions directly. This comprehensive guide provides an in-depth understanding of the GLBA, including all its latest updates and amendments. Let’s dive in. Intro to the GLBA The Gramm-Leach-Bliley Act (GLBA for short) is a US federal law that requires “financial institutions” – defined as companies offering customers financial products or services like loans, financial or … Read More

The Human Factor: The Perfect Employee Training

Cole PrudenData breach, Data Leak Prevention, Data Loss Prevention, Reducing Employee Negligence

The Human Factor: The Perfect Employee Training

Part 2 of 3: Reducing Data Leaks + Data Security Awareness Employees are responsible for 90% of all data breaches! That’s why Part 1 of this mini-series discusses the basics of data leaks, while Part 2 tackles the source of the problem: Human error. This is the last employee training you’ll ever need! 1. Intro to Information Security All employees … Read More

Data Loss Prevention: 3 Basic Steps to Data Protection

Cole PrudenData breach, Data Discovery, Data Loss Prevention

Data Loss Prevention: 3 Basic Steps to Data Protection

$4.44 million. That’s the average cost of a data loss instance in 2025. Unless you’ve got that kind of cash just lying around, taking steps toward Data Loss Prevention will be your best option. But who’s keeping your data safe? Intro to Data Loss Prevention Before you get anywhere near avoiding that 4-million-dollar “hit” to the yearly budget, you first … Read More

The Human Factor: How to Eliminate Data Breaches Caused by Employees

Cole PrudenData Breaches, Data Leak Prevention, Personal Data Protection, Reducing Employee Negligence

The Human Factor: How to Eliminate Data Breaches Caused by Employees

Part 1 of 3: Data Leak Basics Nearly 90% of breach incidents are caused by human error. This 3-part mini-series tackles the subject head-on, covering everything from root causes and prevention techniques to the perfect employee training. Let’s get started. What is a Data Leak? A data leak, often called a data breach, is the intentional or unintentional release of … Read More

Fast & Accurate Data Breach Resolution

Cole PrudenData breach, Data Leak, Personal Data

Fast & Accurate Data Breach Resolution

You’ve suffered a data leak, and the clock’s already ticking. Oh, and it’s a large dataset, too. Where do you even start to locate every single instance of PII involved? Let’s get into it! Breach Incident Scanner Discovering leaked sensitive information and PII by hand is completely unrealistic for large datasets, so automated solutions like PII Tools come in handy. … Read More

Can AI Accurately Identify Person Names in Text?

Cole PrudenData Loss Prevention, Personal Data, Personal Data Discovery, Real-Time Automation, Uncategorized

Can AI Accurately Identify Person Names in Text?

Detecting person names correctly while avoiding false positives is a real time-saver for breach investigations, DSARs, and regulatory compliance. But can this process be automated with AI? Let’s find out. Person Name Identifiers A person name identifier is any information that can be used to directly or indirectly identify an individual, with their actual name being the primary example. Use … Read More

PII and Its Many Forms

Cole PrudenPCI DSS, Personal Data, Personally Identifiable Information, PHI, PII, Self-Hosted Auditing Software, Sensitive Data Protection

PII and Its Many Forms

Sensitive data and personal information come in many shapes and sizes. And with so many different regulations around the globe, it’s easy to confuse one with another. These are the basics of PII and every form you’ll find it in. Let’s get into it. Understanding PII The world of sensitive data protection has its own terminology you’ll need to be … Read More

How to Avoid Uploading Sensitive PII to Microsoft Copilot

Cole PrudenData Protection, Personal Data, Personal Data Protection

How to Avoid Uploading Sensitive PII to Microsoft Copilot

AI tools like ChatGPT and Microsoft Copilot can be useful time savers, but at what cost? There’s no reason you can’t get the best of both worlds—helpful AI models and secure PII. Let’s get into it. Major Copilot Concerns Estimates show that Microsoft Copilot has as many as 33 million active users. And yet, it comes with multiple security risks … Read More

Discovering Person Names in Texts Made Easy

Cole PrudenPersonal Data, Personal Data Discovery

Discovering Person Names in Texts Made Easy

PII Tools streamlines detecting person names with +99% accuracy, even rolling them into Person Cards® for easier export and remediation. Let’s find out how. Basics of Person Name Discovery Detecting people’s names in text is the most fundamental activity in sensitive data discovery. But there are many ways to achieve this task, some more effective than others. The main driver … Read More

How to Scan for PCI DSS Data

Cole PrudenCompliance, Data Protection, PCI DSS

How to Scan for PCI DSS Data

Effortlessly locate every piece of credit card data and streamline your PCI DSS compliance with PII Tools. Perform in-house audits, remediate at-risk data, and avoid potential fines. This is how. Intro to PCI DSS The Payment Card Industry Data Security Standard (PCI DSS, for short) is an information security standard organized by major credit card companies (Visa, Mastercard, etc.), aimed … Read More