Data breaches are so big these days, they’re measured by records stolen in the millions and even billions! With seemingly so many happening literally every day, let’s explore some of the standout cases and aftermath that followed. Your Data Has Been Leaked The title says it all. At this point, it’s safe to say that various parts of your personal … Read More
The Evolution of PII Protection: From Paper to Digital
PII has come a long way in a relatively short time, yet protecting it fully is like trying to shield a moving target. But sometimes the best way to choose a path forward is to peek at the past and learn from its evolution. Humble Beginnings It’s hard to think about PII, or rather Personally Identifiable Information, without also imaging … Read More
3 Major Changes with PCI DSS v4.0.1
The long-awaited update to version 4 of the PCI DSS has only been in force since spring 2024. And already it’s been revised into v4.0.1. Let’s take a look at 3 changes you need to know about. First There Was v4 Before we get too deep into this latest revision, it’s important we’re all up to speed on this set … Read More
Mishandling PII: The Risks and Consequences
Fines, penalties, fees… Oh my! But by mismanaging PII, we stand to lose more than just money. It’s time to look at what’s at stake and learn how to avoid these numerous pitfalls. It’s All About the Money Unfortunately, for many people and companies, the only time they actually start to care is the moment their wallet gets involved. Taking … Read More
Understanding PCI DSS v4.0
Understanding PCI DSS v4.0 The latest update to the PCI DSS is finally in full force. Discover the ins and outs of this sometimes tricky regulation and make sure you’re processes are still up-to-date. Let’s get into it! A Quick Refresher If your business accepts cards in any way, it’s safe to guess you’re already well familiar with the PCI … Read More
10 Reasons YOU Should Be Using PII Tools Right Now!
There are plenty of reasons to use PII Tools Data Discovery Software, but we’ve managed to narrow them down to our TOP 10. Let’s check them out! #1 Automated Scanning for 400+ File Formats The more daily tasks you can fully automate, the more time you can focus on what actually makes your company money. And with over 400 compatible … Read More
FERPA, Compliance, and Everything in Between
Another day, another data compliance to wrap our heads around. This time, uncover the basics of FERPA, who it protects, why you should care… and everything in between. FERPA – The Champion of Students FERPA… aren’t those the local guys on Mt. Everest, carrying all the rich “mountaineers’” equipment to the top and back, with no oxygen tank or fancy … Read More
How to: Protecting ePHI
The average healthcare breach exposes 3+ million private patient records. What are you doing to discover, store, and protect ePHI? Why the ‘e’ in ‘ePHI’? HIPAA, PHI, PII, GDPR, ePHI… Where would we be without our acronyms? If you’re interested in protecting ePHI, it’s safe to say none of these are entirely new to you. The most important to our … Read More
Intro to Integrated Risk Management
What’s the worst thing about risks? They’re often hiding where you’d least expect them. So, let’s review a few best practices for finding and eliminating them. IRM 101 Few words captivate audiences more than Integrated Risk Management (IRM). It’s easy to picture them displayed on a corporate slideshow for a room full of less-than-enthused paper pushers just waiting for their … Read More
The Best Protection Against AI Attacks
Cyber-attacks are at an all-time high, and AI has only made them more rapid and efficient than ever. What are the best ways to protect yourself when “fighting against the machines”? A Newest Calamity In 2020, the World Economic Forum issued its yearly Global Risks Report, claiming cyber-attacks now stand alongside natural disasters and climate change as one of humanity’s … Read More




