A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More
Data Leaks: How to Eliminate Employee Error
Nearly 90% of breach incidents are caused by human error. No matter the size of the company, the employees hold the key to reducing potential data loss. What can you do to eliminate data leaks from occurring in your business? What is a Data Leak? A data leak, often called a data breach, is the intentional or unintentional release of … Read More
Scanning Office 365 for sensitive PII information
Discover personal & sensitive data inside Office 365 accounts and remediate it. This includes both structured and unstructured data in Microsoft OneDrive, Microsoft Exchange Online, and Sharepoint Online. What does “support Office 365” mean? With PII Tools, you directly find, review, and remediate personal and sensitive information in documents, emails, and tables shared within your company’s Office 365 accounts. No … Read More
The Basics of the PCI: What Makes It Different
Today’s businesses are expected to adhere to many standards and regulations, everything from the notorious GDPR, to the more locally applicable LGPD. Luckily, many of the big-name data protection regulations share a similar base structure. But what about the PCI Standard? What sets it apart from the pack?
Making GDPR Compliance Simple
By now, we should all be well aware of the GDPR and what it means for our business. How is it then that so many companies remain GDPR non-compliant? Is the regulation too complicated, too time-consuming, or is it just a hassle? Discover everything you need to know to easily comply with the GDPR today. What is the GDPR and … Read More
How to Identify Personal Data in the 21st Century
Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More
Learning the Difference Between Data Privacy and Data Security
Companies often believe that by securing their sensitive data, they automatically comply with the requirements of various data privacy regulations (GDPR, HIPAA, CCPA, etc.). Unfortunately, this is not the case. Let’s take a look at these two terms to understand the difference and make sure you adhere to both. It’s a bad habit to treat data security and data privacy … Read More
Data protection of EU citizens jeopardized
The data protection of EU citizens under the GDPR is officially at risk as Helen Dixon, the Irish Data Protection Commissioner (DPC), publicly stated that the Irish Regulator does not decide on many citizens’ complaints. The Irish Data Protection Commissioner (DPC) has a huge responsibility on her shoulders because most of the tech giants (think Google or Facebook) have their … Read More
The What, Why, and How of PII Auditing
You’ve heard stories of companies running into trouble by not maintaining PII compliance and suffering severe legal ramifications. But what does that mean for you? Out of all the data you have, you’re sure you don’t have any PII lurking around in unwanted or even unlawful areas, right…? Ready or not, your next scheduled PII audit is around the corner. … Read More
What Are Sensitive Data Discovery Tools and How Do They Work?
With technology progressing and changing every day, it can sometimes be difficult to keep up with the times. As a business, however, falling behind can mean letting important (and legally binding) information fall through the cracks, disappointing customers and losing the trust of business partners. This is where sensitive data discovery tools come into play. But what exactly are they … Read More




