


HOW TO SAFEGUARD YOUR DATA IN NEXTCLOUD FOR SECURE COLLABORATIVE WORK?
Nextcloud is one of the preferred cloud storage solutions for businesses. This open source tool allows you to configure your own cloud on a web server, highlighting its high capacity to customize the configuration. Although it also stands out for the control that can...
LibreOffice Document Protection
In this blog article we show you how to encrypt and control permissions on the content in files of the LibreOffice office suite both in ODF format (.odt, .ods, etc.) as in MS-Office format (.docx, .xlsx, etc.). TABLE OF CONTENTS LibreOffice: The Open Source...
3 Data Security & Privacy Trends to Know in 2023
In this article we echo the data security and privacy predictions in 2023 made by different market analysts. The ever-increasing personal data protection regulations in the world, the need to contain and mitigate information leaks in companies and the changes in...
CIS Critical Security Control 3 v8: Improving organizations data protection strategy
Know in depth the CIS Security Control 3 v8, a set of security safeguards to help organizations on data protection, the new changes compared to v7, all the safeguards and how to implement CIS Control 3 effectively. TABLE OF CONTENTS 1. A brief background about data...
Advantages of Data Classification boosted by AI and Machine Learning
In this article you will find out how the most advanced and innovative technology on the market in terms of data classification works, the one boosted by Artificial Intelligence and Machine Learning. You will learn what all this technology will provide organisations...
Who should encrypt the data in my company?
The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...
Predictions in the field of Data-Centric Security for 2022
In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use
Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...
File Integrity Monitoring through a Data-Centric Security Approach
In this article, we are going to focus on the concept of information integrity, and more specifically, we will discuss the technologies around what is known as File Integrity Monitoring (FIM) and how a data-centric approach to protection can help us maintain it. Table...
Protecting the three states of data
When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs. Some clients need to protect the information on their mobile computers or laptops in case they are lost. Others want to keep...