Blogs

blog post
Why data footprint reduction is essential to data security and how to do it right

It’s nearly impossible to overstate how rapidly the data universe is growing. While most people still think enterprise data is…

Data Privacy Data Protection Data Security

blog post
Tax Security Checklist: How to file safely and avoid data theft

In 2020, the IRS exposed $2.3 billion in tax fraud, ranging from identity theft to refund fraud. The agency also…

Data Protection Data Security

blog post
5 emerging telehealth data security risks—and what to do about them

Telehealth is on the rise, bringing with it an array of incredible benefits but also underscoring a number of emerging…

Data Security

blog post
How to refocus your cybersecurity team’s assumption of compromise paradox to a data protection model

About the author From solutions architecture to security, Gumbs Gumbs brings deep technical experience to his position as Chief Innovation…

Data Breach Data Protection Data Security

blog post
Healthcare under attack: How backup systems make or break your response to ransomware

When the global pandemic began to impact the U.S. with shut downs and concerns about the ability for medical facilities…

Data Breach Data Privacy Data Protection Data Security

blog post
Focus on changing perimeter protection

October is Cybersecurity Awareness Month. Securing data will likely be a key theme to the month, as data privacy laws…

Data Privacy Data Security

blog post
Mr. Jeff Horne, Chief Security Officer at Ordr talks about security issues in our daily life and home

We promise you will never look at your appliances the same way again after listening to this episode. This is…

Cybersecurity Data Security Personal Data

blog post
Michelle Madsen, a Freelance Investigative Journalist, Talks about the Recent Invasion of Her Privacy

This week, Gabe and Cameron talk to a guest with a different perspective on privacy – a freelance investigative journalist…

Data Privacy Data Security Personal Data