Blog
The Benefits of Automating IBM i Spool File Conversion and Delivery
By Greg J. Schmidt on Wed, 06/14/2023
Discover how automating your IBM i spool file management and delivery can make your data more accessible to users and easier to deliver for administrators.
Blog
Data Classification and Data Loss Prevention (DLP): A Comprehensive Data Protection Strategy
Tue, 05/23/2023
Data is the world’s currency and has been for some time. Protecting data should be at the top of the list for organizations of any size, and the heart of any security strategy. Think about it: the purpose of any firewall, email solution, compliance regulation, or XDR platform is to keep data safe. Why not cut to the heart of it with a dedicated Data Loss Prevention (DLP) solution? And why not...
Blog
Security Awareness: The Groundwork of Cybersecurity Culture
Wed, 05/03/2023
It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not.Criminal hackers go after the low...
Blog
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To?
Mon, 03/27/2023
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
Blog
Modern Data Security for the Enterprise
Fri, 07/01/2022
In this guest blog, Christopher Wilder of Tag Cyber provides a high-level overview of how companies can layer security solutions to ensure their data is fully protected no matter where it resides, how it travels or is shared.
Blog
What is the Data Security Lifecycle?
By Brian Pick on Tue, 01/18/2022
What is the data security lifecycle, and how does it impact your business? Discover the stages of the data security lifecycle, and how end-to-end encryption can help with your data protection.
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
HelpSystems’ (now Fortra's) Steph Charbonneau Discusses Data Security, Corporate Culture, and More
Tue, 06/29/2021
Data security, corporate culture and more are discussed by Fortra’ Steph Charbonneau on popular blog, ModernCTO.
Blog
Data Classification Best Practices
Mon, 06/14/2021
Data classification tools not only help organizations to protect their data, they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between technology and people-focused training to achieve an inclusive security culture.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
What does CUI mean for government agencies?
Fri, 05/21/2021
Adam Strange, global marketing director at Titus, by Fortra, discusses what Controlled Unclassified Information (CUI) means for government agencies.
Blog
What are Data Security Solutions and How do They Work?
Wed, 05/12/2021
The widespread use and distribution of information makes securing data a significant challenge. In this blog post, we take a detailed look at how Data Security Solutions help solve this problem.
Blog
What is the LGPD? Meet Brazil’s New Powerful Data Protection Law
By Kurt Thomas on Thu, 01/28/2021
Brazil is Latin America’s largest technology hub and has the eighth-largest economy by GDP. Getting to know the ins and outs of LGPD is essential for doing business there.