Blogs


blog post
Data Breach Bullseye – Part 3

In this series, we are tracking the impact of last year’s record number of sensitive data breaches on three of…

Breaches Data Security Sensitive Data

blog post
Data Breach Bullseye – Part 2

This series will discuss 2021’s sensitive data breach statistics for three of the most vulnerable industries prone to cyberattacks: healthcare, financial…

Breaches Data Security Sensitive Data

blog post
Data Breach Bullseye – Part 1

This series will discuss 2021’s sensitive data breach statistics for three of the most vulnerable industries prone to cyberattacks: healthcare, financial…

Breaches Data Security Sensitive Data

blog post
Weighing the risk of data breach noncompliance

2021 saw a record number of data breaches, despite 34% of organizations under-reporting them. What does this tell us? Data…

Breaches Data Security GDPR Sensitive Data

blog post
Looking back at the data breaches of 2021

2021 was a year like no other. Emerging from the previous year’s COVID-related madness, remote work environments became the new…

Breaches data breach Sensitive Data

blog post
The lucrative cost of cybercrime of PII

As the rate of data breaches increases year over year, the sale of personally identifiable information (PII) is becoming more…

Breaches Sensitive Data

blog post
Understanding malicious insider threat examples to avoid an insider attack

In 2020, insider threats were responsible for 60% of data breaches. Insider threats occur when an employee’s privileged access is…

Data Security Sensitive Data Sensitive Data Manager

blog post
7 Things to Consider When Classifying Your Sensitive Data

Data classification is simple in theory. It involves tagging pieces of data by their levels of sensitivity and applying security…

Classification Sensitive Data