Blogs
What is a data retention policy and should you have one?
In order to collect and process consumers’ sensitive data to fulfill both day-to-day and long-term business needs, companies must implement…
By Ryan Tully on December 3, 2021
Data Protection Data Security
Understanding malicious insider threat examples to avoid an insider attack
In 2020, insider threats were responsible for 60% of data breaches. Insider threats occur when an employee’s privileged access is…
By Spirion on November 10, 2021
Data Security Sensitive Data
Spirion and RSAC Host U.S. Data Privacy Trailblazers Webcast
Panel Featuring State Legislators Explores Privacy-Forward Data Protection Compliance Strategies ST. PETERSBURG, FL―November 8, 2021― Spirion, a pioneer in data…
By Ryan Tully on November 9, 2021
Data Security
What is an Insider Attack?
Insider cyber attacks are a common cause of data breaches, and the volume of attacks, as well as the overall…
By Spirion on October 27, 2021
Data Security
CJIS: Finding the right solution to a tricky compliance situation
As of January 2021, the FBI is moving towards the more sophisticated method of data exchange known as the National…
By Ryan Tully on October 13, 2021
Data Security
Business data security guide (measures, risks & precautions)
Businesses collect and store important data on a daily basis — anywhere from their customers’ personal information to private financial…
By Ryan Tully on September 15, 2021
Data Protection Data Security
Why Florida’s new Cybersecurity Operations Center law is relevant to battling cybercrime
On June 29, Florida governor Ron DeSantis signed into law H.B. 1297, a bill designed to assist the state in…
By Ryan Tully on July 21, 2021
Data Privacy Data Protection Data Security
Remote work and data protection: How data governance teams can get control over an ever-expanding IT frontier
The explosion of remote work during the COVID pandemic exacerbated an already existing headache for company IT departments: how to…
By Spirion on July 20, 2021
Data Privacy Data Protection Data Security Sensitive Data