PII Examples

Cole PrudenPersonal Data, PII, PII Examples

Below you’ll find a list of PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, last name, maiden … Read More

The Complete Guide to PII

Cole PrudenPersonal Data, PII, PII Examples

Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More

Data Leaks: How to Eliminate Employee Error

Cole PrudenData Breaches, Data Leak Prevention, Personal Data Protection, Reducing Employee Negligence

Nearly 90% of breach incidents are caused by human error. No matter the size of the company, the employees hold the key to reducing potential data loss. What can you do to eliminate data leaks from occurring in your business? What is a Data Leak? A data leak, often called a data breach, is the intentional or unintentional release of … Read More