How To: Understanding HIPAA Compliance

Cole PrudenHIPAA Compliance, PHI, PII

For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More

Data Leaks: How to Eliminate Employee Error

Cole PrudenData Breaches, Data Leak Prevention, Personal Data Protection, Reducing Employee Negligence

Nearly 90% of breach incidents are caused by human error. No matter the size of the company, the employees hold the key to reducing potential data loss. What can you do to eliminate data leaks from occurring in your business? What is a Data Leak? A data leak, often called a data breach, is the intentional or unintentional release of … Read More

Discover Sensitive Data with SaaS

Cole PrudenEnd-Business SaaS, Mandatory Data Compliance, Sensitive Data Discovery Tool

Within the world of sensitive data discovery, there are many roads you can take to remain compliant to mandatory regulations. Unfortunately, many of these roads can leave you with more questions than answers. If you’re looking for a simpler route to protect your company’s data, SaaS is right for you. What is SaaS? Pronounced /sæs/, SaaS stands for Software as … Read More

The Basics of the PCI: What Makes It Different

Cole PrudenPCI DSS, Regulatory Compliance, Sensitive Data Discovery Tool

Today’s businesses are expected to adhere to many standards and regulations, everything from the notorious GDPR, to the more locally applicable LGPD. Luckily, many of the big-name data protection regulations share a similar base structure. But what about the PCI Standard? What sets it apart from the pack? What Is the PCI? Before we get too far, we’ll need to … Read More

Making GDPR Compliance Simple

Cole PrudenPersonal Data Discovery, Regulatory Compliance, Self-Hosted Auditing Software

By now, we should all be well aware of the GDPR and what it means for our business. How is it then that so many companies remain GDPR non-compliant? Is the regulation too complicated, too time-consuming, or is it just a hassle? Discover everything you need to know to easily comply with the GDPR today. What is the GDPR and … Read More

The 3 Best Practices for Preventing Data Leaks

Cole PrudenData Audit, Data Leak, Leak Management

Suffering a data leak can be devastating. Depending on the size of your company and the amount of data you store, a single data breach could signal the end of your business. And with the number of data leaks only on the rise, it’s time to implement prevention’s best practices. Data Leaks Although we’ve all most likely heard of dangerous … Read More

PII and Its Many Forms

Cole PrudenPersonally Identifiable Information, Self-Hosted Auditing Software, Sensitive Data Protection

Sometimes, it feels like the goal of tech agencies and federal regulations, such as the GDPR, is to confuse us. Unless you’re used to using terms like “protected information” and “sensitive data” and seeing acronyms like PII, PCI, HIPAA, etc., this topic can seem a little daunting. So, let’s break it down and learn the exact differences between frequently used … Read More

What is PII and How Does it Affect You?

Cole PrudenPersonally Identifiable Information, Self-Hosted Auditing Software, Sensitive Data Protection

When it comes to protecting yourself and your company’s best interests, there are many forms of personal information to watch for. What exactly are these kinds of sensitive data, what is your relationship to them, and how does protecting them affect you and your business? What Exactly is PII If you’ve spent any time in the tech sphere or within … Read More

Explaining Data Subject Access Requests — DSARs

Cole PrudenDSAR, PII, Right of Access

As a company owner in the 21st century, simply staying up-to-date on data compliance regulations will no longer cut it. Especially with the introduction of the GDPR in Europe, people have grown more interested in protecting their private information than ever before. So, when the time comes and one of your employees or customers makes a subject data access request, … Read More