Featured Post What You Need to Know about PST Migration and Elimination April 20, 2023 Find out how PST file migration and elimination can be an important process for organizations that are concerned about data risk and compliance. Read More
The "Reasonable Security" Standard For Data Privacy Revisited, Again January 25, 2023 Has Reasonable Security Finally Been Defined for Privacy Laws? My bottom line remains that data privacy laws must become more prescriptive... Learn More
Why SharePoint Online is becoming an essential solution for successful cloud adoption January 19, 2023 The key to successful digital transformation - the move away from the complexity and costs of individual corporate data centers to complete cloud adoption Learn More
Data Minimization Policies and Effective Cybersecurity December 28, 2022 Corporate data is accumulating at an unprecedented rate. Learn why data minimization policies are a key requirement for effective cybersecurity. Learn More
Reasonable Security for Data Protection: Has it Been Defined? September 22, 2022 Discover whether the Wawa data breach settlement helped to finally define "reasonable security" for data protection and US privacy laws. Learn More
Data Privacy & Security are Now the Biggest Business Drivers for InfoGov July 27, 2022 According to a recent 2022 survey published by the MER organization, the number one business driver for information governance initiatives is data security Learn More
Apple Withdraws from State Data Privacy Industry Coalition April 14, 2022 Recently, Apple left the State Privacy and Security Coalition expressing concerns the organization doesn't go far enough to protect users’ PII. Learn More
Survey Says! It's Finally Time for Legacy App Data to Move to the Cloud January 27, 2022 A new survey from Archive360 has revealed the top four barriers for tech executives migrating legacy application data to the cloud. Learn More
Safe Harbor Cybersecurity Laws Needed for PII Data Security August 26, 2021 Proactively employ data security capabilities and safe harbor cybersecurity practices to mitigate the impact and lower your cost when a PII data breach occurs. Learn More
US State Data Privacy Laws & "Reasonable Security" Practices June 30, 2021 Understand the complexities of US state data privacy laws and the concern behind the "reasonable security" practices that they require. Learn More
Cyberhackers are Targeting your Organization’s Sensitive Data January 19, 2021 Mimecast, an email archiving company, was successfully attacked by a cyber-hacker compromising approximately 10% of the company’s customers. Learn More
Ransomware-Proof Data Backups & Cloud-Based Archives December 2, 2020 Can ransomware infect encrypted data backups and cloud-based storage? Learn how to ransomware-proof your data archives and information repositories. Learn More
Reducing Cloud eDiscovery Costs: Processing & Data Collection October 26, 2020 Data collection, processing, and culling all contribute to eDiscovery costs. Learn how information management can reduce your company's eDiscovery spend. Learn More
Legacy Application Retirement - Keep Data Before Decommissioning August 18, 2020 Learn more about legacy application retirement and decommissioning of legacy applications while still maintaining eDiscovery and regulatory requirements. Learn More
Privacy Shield Invalidated in Schrems II: Are SCCs Next? July 30, 2020 In its Schrems II ruling, the CJEU invalidated the Privacy Shield and many experts suggest that SCCs could be next. Find out what this means for your company. Learn More
Lawful Access to Encrypted Data Act, Clouds & Secrecy Orders July 16, 2020 Learn how the Lawful Access to Encrypted Data Act and 3rd-party cloud storage make it easier for the government to obtain companies' data. Learn More
CCPA Enforcement has Begun - The Risks Most Companies are Not aware Of June 30, 2020 Unlike the EU’s GDPR, the CCPA includes a surprising provision that requires a company to be able to “look-back” 12 months from the law’s effective date. Learn More