Blog

Blog

Data protection for remote workers

Working remotely has become the “new normal”, at least for the foreseeable future. Some 1.5 billion people are now working remotely. It seems companies overnight moved into a work-at-home reality, and many workplace experts predict that more and more organizations will continue to rely on remote workers after this pandemic has passed. Virtual work settings are not new. Companies around the world...
Blog

How do you handle the ticking time bomb of dark data?

Organizations of all sizes face a similar challenge: the ticking time bomb of old data. 2020 is expected to be a period of exceptionally rapid data growth, with the growth in demand outstripping growth in storage supply solutions, according to Harvard Business Analytics. Adding to the complexity: 80% of all data organizations generate daily is unstructured, that is, stored but not easily found...
Blog

NATO: Leading The Way With A Common Classification Standard

Data needs to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well as and provide ongoing post-release control of the information we have shared. Fortra has worked with sensitive messaging systems in the defense and intelligence environments; this has also included a lot of direct contact with NATO and the...
Blog

Data Classification Tools

Data Classification Tools: Why Are They Needed? Data classification tools are becoming more and more of a necessity for businesses and organizations – especially those with increasingly decentralized staff and contractors. The amount of data being sent to and received from different departments and units within your organization – as well as exchanged with external partners – is at an all-time...
Blog

Data Classification: The 5 Steps to Effectively Classify Your Data

A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organizations often have a written policy that’s available on their company intranet and handed to new starters. In practice, however, employees are rarely sure how to apply it to their daily activities. The security policy needs to be made...
Blog

Meet the latest EPMS requirements — and boost your data security strategy

Have you updated your agency to the Email Protective Marking Standard (EPMS) version 2018.2 ? As you likely know, changes to the standard went into effect 1 January 2019. Since the last iteration was released in 2010, the EPMS standard has been amended. The changes include updates to the range of security classifications, changes to specific markings and caveat types, as well as new language used...
Blog

What is SOX Compliance? 2019 SOX Requirements & More

A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act sets deadlines for compliance and publishes rules on requirements. Congressman Paul Sarbanes and Michael Oxley drafted the...
Blog

Better Together – Microsoft AIP and Fortra's Data Classifier

Following on from our first post of the series, What is AIP ?, this week we look at how AIP is better when paired with Fortra's Data Classifier , and the business value you will get from this partnership. In the world of enterprise data protection and data classification , the requirement for flexible solutions combining best-of-breed functionality with sophisticated policy support is viewed as...
Blog

Enhancing Microsoft AIP: What is AIP?

Microsoft Azure Information Protection (AIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. AIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of AIP is to help organizations capitalize on the...
Blog

The Balancing Act: Education vs Enforcement

Let’s face it – there are very few people in this world who like being told what to do. We often find that suddenly enforcing strict rules and big changes, in both social and working environments, is met with resistance. Questions arise: Why are things changing? Why should I care? What benefit does this have to me? The list goes on… A good deal of human interaction is based around getting other...
Blog

At the Leading Edge of NATO Data Centric Security

Fortra Data Classification has been leading the way with Military Messaging Handling Systems (MMHS) using Microsoft Exchange as the core messaging service. This has involved supporting the full evolution of NATO STANAG’s (Standard NATO Agreement) from the early draft revisions through to the latest ratified versions agreed by the member nations. In particular, the STANAG 4406 has been the most...
Blog

The 5 W’s of Data Identification and Inventory

Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organization’s data, its importance and the level of protection required. I always figured that you would need to know what you have in order to protect it. However, I have seen far too many companies implement “best practices,” standards, or compliance programs without first...
Blog

GDPR: Effective Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Many companies are currently in various phases of projects to comply with the European Union’s General Data Privacy Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in my view, over simplify solutions to issues that are raised. Rather than try to address the whole of the regulation, I want to speak specifically...
Blog

Seven Reasons to Classify Your Data

The best way to protect and govern your data is to let it tell your business applications and infrastructure what it contains. Chris Farrelly, General Manager at HANDD Business Solutions, explains how that’s possible and why you should do it A quick Google search on “data, lifeblood, and business” turns up dozens of headlines, each with a hoary old cliché: data is the lifeblood of your company...
Blog

Data Classification in Healthcare

Healthcare is a highly competitive industry where payers and providers are subject to significant regulatory oversight. The complex needs of these organizations, and their patients, must be delivered in as efficient a manner as possible, and with precision, while taking every precaution to ensure appropriate levels of data security and privacy. Given the data involved, and its very direct...
Blog

Data Classification as a Catalyst for Data Retention and Archiving

Why is Data Retention & Archiving Important? Businesses manage data retention in a multitude of ways for many different reasons, ranging from technical considerations to privacy and liability concerns. The regular considerations are, and will always be, top of mind to include regulatory requirements and compliance, financial reporting, disaster recovery and others – but there is a growing sense if...
Blog

Benefits Of Email Classification Software

Email classification software gives businesses the ability to classify emails in accordance with their sensitivity. This ensures that you have better control over data, and that confidential information is only shared with intended recipients. Read on to discover more about the benefits of such software in further detail. Assess your company’s level of compliance With data breaches on the rise...
Blog

Data Classification Tools – Do You Track And Protect Your Business’s Data Effectively?

Data classification tools are increasing in popularity with every day that goes by. This is of no surprise when you consider the huge threat of a data breach and the increased coverage such incidents are getting on television. Businesses are now concerned with the welfare of their data, and so they should be. One of the only ways to ensure you manage your data effectively is to invest in data...