Over the past two decades, the online world has experienced a true revolution in data protection. But each corner of the world handles PII differently, so put on your sunglasses and safari hat because we’re headed to South Africa!
Intro to Integrated Risk Management
What’s the worst thing about risks? They’re often hiding where you’d least expect them. So, let’s review a few best practices for finding and eliminating them. IRM 101 Few words captivate audiences more than Integrated Risk Management (IRM). It’s easy to picture them displayed on a corporate slideshow for a room full of less-than-enthused paper pushers just waiting for their … Read More
The Best Protection Against AI Attacks
Cyber-attacks are at an all-time high, and AI has only made them more rapid and efficient than ever. What are the best ways to protect yourself when “fighting against the machines”? A Newest Calamity In 2020, the World Economic Forum issued its yearly Global Risks Report, claiming cyber-attacks now stand alongside natural disasters and climate change as one of humanity’s … Read More
How To: Understanding RoPA and Achieving Compliance
Did you know the GDPR has 99 different articles and over 250 pages? You’ll likely never know each provision individually, but there’s at least one article worth paying extra attention to. Meet Article 30: RoPA. The GDPR If you’re the kind of person interested in articles about sensitive data and compliance, we sure hope you’re already well aware of the … Read More
Classify Data in 3 Easy Steps
Quick scans, Custom Detectors, and Custom Severity. Learn to classify information automatically and guarantee every piece of your data protection puzzle is perfectly in place. Why Classify Data? Before we get to the details, it’s worth mentioning the main reasons why you should even bother to classify different types of personal data. On average, companies keep over 2 PB of … Read More
Data Redaction: The Essential Guide to Protecting Sensitive Data
The long-awaited data redaction feature by PII Tools is finally here. Generate new, AI-driven PDFs from original files with all personal data automatically blacked out – this is the future of genuinely efficient data redaction. What Does Data Redaction Mean At PII Tools, we’ve made it our calling to create AI-driven software to maximize data discovery and the remediation of … Read More
The California Delete Act: How it affects organizations
All it takes is one request, and poof… everything’s gone. What is the California Delete Act Sunny California has long been a leader in surfing, movie-making, and… consumer privacy? That’s right, and as of Jan. 1, 2024, the California Privacy Protection Agency (CCPA) is set to enforce a new law that could completely change data storage as we know it. … Read More
Person Cards® – The Holy Grail of Data Discovery
By 2025, the global datasphere is estimated to hold as much as 175 zettabytes of data. How can companies today possibly have a chance to organize that much information? The answer: Person Cards®. More Data, More Problems 175 zettabytes of data worldwide? Considering a single zettabyte is equal to a trillion gigabytes (yes, with a ‘T’), the actual amount of … Read More
What’s new: NIST Cybersecurity Framework 2.0
It’s been almost 10 years since the original CSF 1.0 was issued, and so much has changed since. What new guidelines does CSF 2.0 bring, and how can you implement them today? Remembering CSF 1.0 Before we get to the new stuff, let’s run through a quick recap of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) … Read More
Data Loss Prevention: 3 Basic Steps to Playing It Safe
$4.35 million. That’s the average cost of a data loss instance in 2022. Unless you’ve got that kind of cash just lying around, taking steps toward Data Loss Prevention will be your best option. But who’s keeping your data safe? DLP for Dummies Before you get anywhere near avoiding that 4-million-dollar “hit” to the yearly budget, you first need to … Read More