Mishandling PII: The Risks and Consequences

Cole PrudenData Protection, GDPR, In-House Protection Software, Personal Data Protection, PII, Security, Sensitive Data Protection

Fines, penalties, fees… Oh my! But by mismanaging PII, we stand to lose more than just money. It’s time to look at what’s at stake and learn how to avoid these numerous pitfalls. It’s All About the Money Unfortunately, for many people and companies, the only time they actually start to care is the moment their wallet gets involved. Taking … Read More

AI and Machine Learning in Sensitive Data Management

Cole PrudenArtificial Intelligence, Personal Data, Sensitive Data

With more tools at our disposal than ever before, how can you use artificial intelligence and machine learning to handle PII and sensitive data effectively? Smart Everything At this point, artificial intelligence (AI) and machine learning (ML) don’t need much of an introduction. Our phones, cars, televisions… even some smart refrigerators come equipped with AI and ML algorithms. It wouldn’t … Read More

10 Reasons YOU Should Be Using PII Tools Right Now!

Cole PrudenData Protection, In-House Protection Software, Personal Data Protection, PII, Private Data, Sensitive Data Protection

There are plenty of reasons to use PII Tools Data Discovery Software, but we’ve managed to narrow them down to our TOP 10. Let’s check them out! #1 Automated Scanning for 400+ File Formats The more daily tasks you can fully automate, the more time you can focus on what actually makes your company money. And with over 400 compatible … Read More

Employee Training: PII Handling and Security Awareness

Cole PrudenData breach, Data Breaches, Data Leak, Data Leak Prevention, Data Loss Prevention, Data Protection, Leak Management, Personal Data Protection, PII, Reducing Employee Negligence, Security, Sensitive Data Protection

Employee training pii handling and security awareness

The vast majority of mistakes leading to breached data are accidental and caused by human error. What are the best ways to train employees to handle PII and build unshakable security awareness? The Greatest Liability: Us Nobody’s perfect. Even if you have 20+ years of experience in data security and breach prevention, you can still slip up and make a … Read More

FERPA, Compliance, and Everything in Between

Cole PrudenCompliance, Regulatory Compliance

FERPA, Compliance, and Everything in Between

Another day, another data compliance to wrap our heads around. This time, uncover the basics of FERPA, who it protects, why you should care… and everything in between. FERPA – The Champion of Students FERPA… aren’t those the local guys on Mt. Everest, carrying all the rich “mountaineers’” equipment to the top and back, with no oxygen tank or fancy … Read More

How to: Protecting ePHI

Cole PrudenPII, Sensitive Data, Sensitive Data Discovery

PII Tools Protecting ePHI

The average healthcare breach exposes 3+ million private patient records. What are you doing to discover, store, and protect ePHI? Why the ‘e’ in ‘ePHI’? HIPAA, PHI, PII, GDPR, ePHI… Where would we be without our acronyms? If you’re interested in protecting ePHI, it’s safe to say none of these are entirely new to you. The most important to our … Read More

A Beginner’s Guide to POPIA

Cole PrudenData Protection, GDPR

PII Tools – POPIA explained

Over the past two decades, the online world has experienced a true revolution in data protection. But each corner of the world handles PII differently, so put on your sunglasses and safari hat because we’re headed to South Africa!

Intro to Integrated Risk Management

Cole PrudenCompliance, PII

What’s the worst thing about risks? They’re often hiding where you’d least expect them. So, let’s review a few best practices for finding and eliminating them. IRM 101 Few words captivate audiences more than Integrated Risk Management (IRM). It’s easy to picture them displayed on a corporate slideshow for a room full of less-than-enthused paper pushers just waiting for their … Read More

The Best Protection Against AI Attacks

Cole PrudenPII

Cyber-attacks are at an all-time high, and AI has only made them more rapid and efficient than ever. What are the best ways to protect yourself when “fighting against the machines”? A Newest Calamity In 2020, the World Economic Forum issued its yearly Global Risks Report, claiming cyber-attacks now stand alongside natural disasters and climate change as one of humanity’s … Read More

How To: Understanding RoPA and Achieving Compliance

Cole PrudenData Discovery, GDPR, GDPR Compliance, Private Data

Did you know the GDPR has 99 different articles and over 250 pages? You’ll likely never know each provision individually, but there’s at least one article worth paying extra attention to. Meet Article 30: RoPA. The GDPR If you’re the kind of person interested in articles about sensitive data and compliance, we sure hope you’re already well aware of the … Read More