Resources

Blog

Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity

Image On Wednesday May 12, the Biden administration took a critical step towards addressing security issues that have come to light after several recent, high profile cyberattacks. The extensive Executive Order (EO) described the government's plan to increase cybersecurity protection across the public and private sectors as well as...
Blog

Data Security Best Practices Every CISO Should Know

Image Aligning Data Security with Organizational Strategy The responsibility for an organization’s information and data security is a hefty one, knowing each day that it’s not a matter of whether a cybersecurity attack will happen, but rather when it will happen on your watch. Whether data is grabbed in a headline-making breach of a...
Blog

What is Data Security?

Image What is Data Security? Generally, data security is described as all that surrounds the protection of digital data from destructive forces or unwanted actions of unauthorized users, such as from a cyberattack or data breach. By this overarching definition, the one thing data security is not is a singular software solution that...
Blog

10 Tips to Protect Your Company´s Data in 2021

Image The amount, complexity, and relevance of the data that companies handle has increased exponentially. Today the data stored by organizations can contain information from buying and selling transactions, market analysis, ideas for future technological innovations, customer or employee information (salaries, health information) and...
Blog

7 Technologies To Help Your Business With GDPR Compliance

Image In today’s global economy, businesses must be compliant with standards established by various countries so they can service customers around the world. One such regulation you can’t afford to ignore is the GDPR (General Data Protection Regulation), which is the core of Europe’s digital privacy legislation. The GDPR applies to...
Blog

All about POPIA compliance: South Africa’s new data privacy law – and what it means for you

South Africa’s Protection of Personal Information Act (POPIA) has finally come into force. That’s good news for South African citizens and residents, since the legislation’s aim is to protect their personally identifiable information (PII) after it’s collected by public and private entities in the country. But what does the new law mean for South African organizations who...
Blog

Orchestrating data security through effective data identification

Image As the Fourth Industrial Revolution evolves and our society and its organizations continue transitioning to what some call the “Age of Data”, certain things have become undeniably self-evident. For one, the amount and velocity of data companies face is now far greater than ever before. Organizations must also handle more and...
Blog

What do companies really do with your data?

Image Serious question: Has anyone, ever, consciously decided not to use a website they require (or even just want to use) because they don’t agree with a cookie consent warning? Cookie consent warnings are those little strips that appear along the bottom of virtually every website you visit nowadays (including ours), notifying users...
Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

Image As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s...
Blog

Are your Zoom meetings vulnerable to data leakage?

Image It is estimated that there are more than 1.5 billion people worldwide working remotely today as a result of the current pandemic. Now that you have most, if not all, of your employees working remotely how do you minimize the risk of data breaches or inadvertent exposure of sensitive data? Protecting the network is a good first...
Blog

Fortra’s Data Classification Suite for Outlook on the web built on the Office Add-in platform

Image Fortra’s Data Classification Suite for Microsoft Outlook on the web is a security and governance add-in that enables organizations to ensure consistent and prudent handling of Outlook emails in real time. Fortra’s Data Classification Suite helps Outlook on the web users: Identify and classify emails based on data sensitivity ...
Blog

Data protection for remote workers

Image Working remotely has become the “new normal”, at least for the foreseeable future. Some 1.5 billion people are now working remotely. It seems companies overnight moved into a work-at-home reality, and many workplace experts predict that more and more organizations will continue to rely on remote workers after this pandemic has...
Blog

How do you handle the ticking time bomb of dark data?

Image Organizations of all sizes face a similar challenge: the ticking time bomb of old data. 2020 is expected to be a period of exceptionally rapid data growth, with the growth in demand outstripping growth in storage supply solutions, according to Harvard Business Analytics. Adding to the complexity: 80% of all data organizations...
Blog

NATO: Leading The Way With A Common Classification Standard

Image Data needs to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well as and provide ongoing post-release control of the information we have shared. Fortra has worked with sensitive messaging systems in the defense and intelligence environments;...
Blog

Data Classification Tools

Image Data Classification Tools: Why Are They Needed? Data classification tools are becoming more and more of a necessity for businesses and organizations – especially those with increasingly decentralized staff and contractors. The amount of data being sent to and received from different departments and units within your...
Blog

Data Classification: The 5 Steps to Effectively Classify Your Data

Image A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organizations often have a written policy that’s available on their company intranet and handed to new starters. In practice, however, employees are rarely sure how to...
Blog

Meet the latest EPMS requirements — and boost your data security strategy

Have you updated your agency to the Email Protective Marking Standard (EPMS) version 2018.2? As you likely know, changes to the standard went into effect 1 January 2019. Since the last iteration was released in 2010, the EPMS standard has been amended. The changes include updates to the range of security classifications, changes to specific markings and caveat types, as well...
Blog

What is SOX Compliance? 2019 SOX Requirements & More

A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act sets deadlines for compliance and publishes rules on requirements. Congressman Paul Sarbanes and...
Blog

Better Together – Microsoft AIP and Fortra's Data Classifier

Following on from our first post of the series, What is AIP?, this week we look at how AIP is better when paired with Fortra's Data Classifier, and the business value you will get from this partnership. In the world of enterprise data protection and data classification, the requirement for flexible solutions combining best-of-breed functionality with sophisticated policy...
Blog

Enhancing Microsoft AIP: What is AIP?

Microsoft Azure Information Protection (AIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. AIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of AIP is to help organizations...