GLBA Compliance Guide

Cole PrudenData Privacy Regulations, Data Protection, GLBA, Uncategorized

GLBA Compliance Guide

GLBA non-compliance fines can reach as high as $100,000 per violation. Learn how to protect both your customers and your budget with full GLBA compliance. Let’s get started! What Is the GLBA? The Gramm-Leach-Bliley Act (GLBA, for short) is a US federal law that requires financial institutions to explain their information-sharing practices to customers and safeguard sensitive data. If you’re … Read More

Self-Hosted Software vs SaaS

Cole PrudenSelf-Hosted Auditing Software, Sensitive Information

Self-Hosted Software vs SaaS

Your corporate data is safest when kept within self-hosted software over SaaS. But are there any other advantages, and how can you leverage them? Time to see how self-hosting compares against SaaS! Self-Hosted Software or SaaS? Companies that opt to secure their sensitive data within self-hosted software benefit in many ways compared to Software-as-a-Service (SaaS) options, even if these appear … Read More

Can AI Accurately Identify Person Names in Text?

Cole PrudenData Loss Prevention, Personal Data, Personal Data Discovery, Real-Time Automation, Uncategorized

Can AI Accurately Identify Person Names in Text?

Detecting person names correctly while avoiding false positives is a real time-saver for breach investigations, DSARs, and regulatory compliance. But can this process be automated with AI? Let’s find out. Person Name Identifiers A person name identifier is any information that can be used to directly or indirectly identify an individual, with their actual name being the primary example. Use … Read More

The Complete Guide to PII – Part 1

Cole PrudenPersonally Identifiable Information, Self-Hosted Auditing Software, Sensitive Data Protection

The Complete Guide to PII – Part 1

Over 402 million terabytes of data are generated every day. And giant companies like Google and Meta can’t wait to collect and sell as much as possible. The first step to protecting your personal data is identifying it. This three-part mini-series will take you through the ins and outs of PII and help you safeguard what’s yours. PII Basics PII … Read More

Classify Data in 3 Easy Steps

Cole PrudenData Discovery, PII

Classify Data in 3 Easy Steps

Quick scans, Custom Detectors, and Custom Severity. Learn to classify information automatically and guarantee every piece of your data protection puzzle is perfectly in place. Why Classify Data? Before we get to the details, it’s worth mentioning the main reasons why you should even bother to classify different types of personal data. On average, companies keep over 2 PB of … Read More

Top Features to Look For When Comparing Data Discovery Tools

Cole PrudenData Discovery, Personal Data, Sensitive Data Discovery Tool, Uncategorized

Top Features to Look For When Comparing Data Discovery Tools

Comparing features of data discovery tools is a complex task that can easily turn into a nightmare. Here is a shortlist of the most important features to take into account when selecting the best option for your business, so you won’t get caught in the net of unimportant details and technical specifications. The main purpose of data discovery tools is … Read More