Featured Post Coming Security Trends in 2021 – What's Ahead February 4, 2021 Organizations that don’t place data security as their top priority will find themselves facing increasing fines and expensive litigation. Read More
Cyberhackers are Targeting your Organization’s Sensitive Data January 19, 2021 Mimecast, an email archiving company, was successfully attacked by a cyber-hacker compromising approximately 10% of the company’s customers. Learn More
Ransomware-Proof Data Backups & Cloud-Based Archives December 2, 2020 Can ransomware infect encrypted data backups and cloud-based storage? Learn how to ransomware-proof your data archives and information repositories. Learn More
Legacy Application Retirement - Keep Data Before Decommissioning August 18, 2020 Learn more about legacy application retirement and decommissioning of legacy applications while still maintaining eDiscovery and regulatory requirements. Learn More
Privacy Shield Invalidated in Schrems II: Are SCCs Next? July 30, 2020 In its Schrems II ruling, the CJEU invalidated the Privacy Shield and many experts suggest that SCCs could be next. Find out what this means for your company. Learn More
Lawful Access to Encrypted Data Act, Clouds & Secrecy Orders July 16, 2020 Learn how the Lawful Access to Encrypted Data Act and 3rd-party cloud storage make it easier for the government to obtain companies' data. Learn More
CCPA Enforcement has Begun - The Risks Most Companies are Not aware Of June 30, 2020 Unlike the EU’s GDPR, the CCPA includes a surprising provision that requires a company to be able to “look-back” 12 months from the law’s effective date. Learn More
Consolidated IoT Data Management, Archiving & Litigation June 10, 2020 Understand the importance of consolidating, managing, and archiving the IoT data residing in the many devices propagating your business. Learn More
Infrastructure versus Information Cyber Security in the Cloud February 19, 2020 What is “cyber security” in the cloud? Why is it important to think about security from both infrastructure security and information security perspectives? Learn More