PII has come a long way in a relatively short time, yet protecting it fully is like trying to shield a moving target. But sometimes the best way to choose a path forward is to peek at the past and learn from its evolution. Humble Beginnings It’s hard to think about PII, or rather Personally Identifiable Information, without also imaging … Read More
How To: Understanding RoPA and Achieving Compliance
Did you know the GDPR has 99 different articles and over 250 pages? You’ll likely never know each provision individually, but there’s at least one article worth paying extra attention to. Meet Article 30: RoPA. The GDPR If you’re the kind of person interested in articles about sensitive data and compliance, we sure hope you’re already well aware of the … Read More
Classify Data in 3 Easy Steps
Quick scans, Custom Detectors, and Custom Severity. Learn to classify information automatically and guarantee every piece of your data protection puzzle is perfectly in place. Why Classify Data? Before we get to the details, it’s worth mentioning the main reasons why you should even bother to classify different types of personal data. On average, companies keep over 2 PB of … Read More
Person Cards® – The Holy Grail of Data Discovery
By 2025, the global datasphere is estimated to hold as much as 175 zettabytes of data. How can companies today possibly have a chance to organize that much information? The answer: Person Cards®. More Data, More Problems 175 zettabytes of data worldwide? Considering a single zettabyte is equal to a trillion gigabytes (yes, with a ‘T’), the actual amount of … Read More
What’s new: NIST Cybersecurity Framework 2.0
It’s been almost 10 years since the original CSF 1.0 was issued, and so much has changed since. What new guidelines does CSF 2.0 bring, and how can you implement them today? Remembering CSF 1.0 Before we get to the new stuff, let’s run through a quick recap of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) … Read More
Data Loss Prevention: 3 Basic Steps to Playing It Safe
$4.35 million. That’s the average cost of a data loss instance in 2022. Unless you’ve got that kind of cash just lying around, taking steps toward Data Loss Prevention will be your best option. But who’s keeping your data safe? DLP for Dummies Before you get anywhere near avoiding that 4-million-dollar “hit” to the yearly budget, you first need to … Read More
Top Features to Look For When Comparing Data Discovery Tools
Comparing features of data discovery tools is a complex task that can easily turn into a nightmare. Here is a shortlist of the most important features to take into account when selecting the best option for your business, so you won’t get caught in the net of unimportant details and technical specifications. The main purpose of data discovery tools is … Read More
Using PII Tools on a Daily Basis
As every GRC team member knows all too well, manually sifting through the company’s seemingly infinite TB of stored data is a full-time job (or a waste of time). But now, with advances in AI-driven data discovery, what does the day of an average PII Tools user actually like? Streamlining Data Discovery The day-to-day mission of any GRC team (Governance, … Read More
How to Identify Personal Data in the 21st Century
Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More
What Are Sensitive Data Discovery Tools and How Do They Work?
With technology progressing and changing every day, it can sometimes be difficult to keep up with the times. As a business, however, falling behind can mean letting important (and legally binding) information fall through the cracks, disappointing customers and losing the trust of business partners. This is where sensitive data discovery tools come into play. But what exactly are they … Read More