The clock is ticking before the GLBA looks to take sensitive data protection to the next level… or maybe the next few levels. And with a deadline just several weeks before the holidays, many companies are scrambling with more than just last-minute Christmas shopping. So, are you ready for the biggest cybersecurity regulation update in the past 20 years? The … Read More
PII De-Identification vs. Masking vs. Redaction
Are you struggling between processing your clients’ PII needed to complete orders while keeping that same info away from any wandering eyes? Data de-identification, masking, and redaction are just a few of the options open to you. What exactly are they and how do they work? De-Identification To put it plainly, de-identification is the process of removing identifying information from … Read More
The New CPRA Umbrella Covers HR Data
Is it too early to start talking about New Year’s resolutions? Well, come January 1st, 2023, the only goal for many HR departments will be unraveling the CPRA’s latest privacy law on HR data. So, will you wait until after Christmas to finally see what all the fuss is about, or will you dive into the CPRA deep end while … Read More
Regular Audits: Do You Really Need Them?
There’s nothing worse than wasting time and money, so is there any benefit to reviewing the data you store? Well, unless you want to be like the kid who never studies for tests, regular audits may be the only thing keeping you out of the principal’s office. To Audit or Not to Audit? By this point, I would hope none … Read More
Do They Even Matter?—The 3 Largest GDPR Fines To Date
For years now, the GDPR has been criticized for offering more bark than bite. As the fines stand, many mega-companies like Amazon and Google are simply getting away without a scratch. All this has left us wondering, what are the 3 biggest GDPR fines so far, and do any of them actually matter? Knowing the GDPR Before we get to … Read More
PII Examples
Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More
The Complete Guide to PII
Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More
How To: Understanding HIPAA Compliance
For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More
How to remediate PII?
PII Tools lets you automatically quarantine, erase, and redact files and emails to sanitize high-risk data. It works equally well over local data (file shares, laptops, devices) and cloud data (including Exchange emails and their attachments, Sharepoint, OneDrive), so let’s explore how to apply remediation to your workflow. Let’s assume you’ve already identified where the sensitive data lives and which … Read More
Creating Data Leak Reports
In this guide, you will learn how to create data leak reports with PII Tools. Launching a scan The first step towards the successful management of any data leak is to identify what was in the breached data. Open your PII Tools and, on the left side, select Launch Scan. If you performed the scan already, skip to the next … Read More