How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More

PII and Its Many Forms

Cole PrudenPersonally Identifiable Information, Self-Hosted Auditing Software, Sensitive Data Protection

Sometimes, it feels like the goal of tech agencies and federal regulations, such as the GDPR, is to confuse us. Unless you’re used to using terms like “protected information” and “sensitive data” and seeing acronyms like PII, PCI, HIPAA, etc., this topic can seem a little daunting. So, let’s break it down and learn the exact differences between frequently used … Read More

How to Identify Personal Data in the 21st Century

Cole PrudenData Discovery, Personal Data, Sensitive Information

Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More