Data Security

Data Breaches In Schools - What Measures You Should Take

Learn about the possible causes of data breaches, and the steps that schools and universities should take to manage a situation like this

April 26, 2022
keep reading
Types of Encryption: Symmetric or Asymmetric? RSA or AES?

If you're looking to encrypt data to protect it, you might find there are different encryption methods and encryption algorithms to pick from. From RSA to AES, your pick should be informed by context.

June 15, 2021
keep reading
Data Leakage and How to Handle It

Data leakage is when data in an organization’s possession is made accessible to third parties without authorization. Some data leaks occur accidentally. Others are intentional.

May 28, 2021
keep reading
Windows 10: The Microsoft Bitlocker Data Encryption Guide

BitLocker is a full-disk encryption tool built into the Windows operating system. Enabling disk encryption is essential to protecting an organization against data breaches.

April 30, 2021
keep reading
The Complete Guide to Data Classification

Data classification is a vital part of an enterprise data security policy. Learn what it is, the various types of data classification, and how to build a classification policy and process for your organization’s data.

April 26, 2021
keep reading
What is a data breach?

Learn how malicious actors can leverage attacks to gain unauthorized access to private data, which they then weaponize.

November 29, 2018
keep reading
Data on the Wild: Protecting Intellectual Property on Remote Workers

What’s on a remote worker's company-owned device? Everything. From the marketing department’s next quarter program, to the sales team’s target accounts.

June 13, 2018
keep reading
Tips and Tricks for Data Security: Making the most out of Prey

Having your devices secured is amazing. You can track them, manage them and even have a software like Prey tell you when your devices have been turned off

March 2, 2017
keep reading