Who should encrypt the data in my company?

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...
3 Ways to Lock CAD files and Protect Companies Drawings

3 Ways to Lock CAD files and Protect Companies Drawings

AutoCAD files contains sensitive information that should be locked to some recipients or protected from editing. Often, companies need to share some CAD drawings with a team of professionals who work collaboratively to improve the designs, framework, or content. But...
How to calculate the cost of a data breach – A Case Study

How to calculate the cost of a data breach – A Case Study

Every day there are news related to companies and public organizations that have suffered a data breach due to an external attack, human error, or negligent actions on the part of employees or former employees. We see that around these news there is data that the...
PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...
Data Processing Agreement, International Transfers and Regulations

Data Processing Agreement, International Transfers and Regulations

In this article we will discuss the implications of the Personal Data Processsing Agreement (DPA) required by the Regulation. This have recently become particularly relevant, more specifically, about data transfers to countries outside the European Union where the...
Predictions in the field of Data-Centric Security for 2022

Predictions in the field of Data-Centric Security for 2022

In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use

Secure Data Collaboration and Control of Information in Use

Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...