Blogs


blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Breaches Classification data breach Data Security DLP PCI-DSS Regulation risk management sensitive data management

blog post
PCI compliance makes dollars and sense

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Breaches Data Protection Data Security PCI-DSS

blog post
Securing member data: Implementing a 5-Step roadmap for Credit Unions

As member-controlled cooperatives, credit unions have a built-in advantage compared to the faceless big bank: trust. Driven by relationships and…

Breaches Data Protection Data Security

blog post
How to refocus your cybersecurity team’s assumption of compromise paradox to a data protection model

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Breaches Data Protection Data Security Uncategorized

blog post
The emerging risk of unstructured data in the public cloud

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Breaches data breach Data privacy Data Protection Data Security Uncategorized

blog post
Healthcare under attack: How backup systems make or break your response to ransomware

When the global pandemic began to impact the U.S. with shut downs and concerns about the ability for medical facilities…

Breaches Data privacy Data Protection Data Security Uncategorized

blog post
How to minimize risk after the Blackbaud data breach

Breaches affect not only the company whose data was stolen, but also every company whose data they store, manage, or…

Breaches Sensitive Data Manager

blog post
How is Data Privacy Changing? Here are 3 Predictions for 2020

2020 Data Privacy Predictions — Tales from a Salty Soothsayer By Gabe Gumbs, Chief Innovation Officer Listen to a blogcast…

Breaches Data privacy Data Security