LibreOffice Document Protection

LibreOffice Document Protection

In this blog article we show you how to encrypt and control permissions on the content in files of the LibreOffice office suite both in ODF format (.odt, .ods, etc.) as in MS-Office format (.docx, .xlsx, etc.). TABLE OF CONTENTS LibreOffice: The Open Source...
3 Data Security & Privacy Trends to Know in 2023

3 Data Security & Privacy Trends to Know in 2023

In this article we echo the data security and privacy predictions in 2023 made by different market analysts. The ever-increasing personal data protection regulations in the world, the need to contain and mitigate information leaks in companies and the changes in...
Who should encrypt the data in my company?

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...
Predictions in the field of Data-Centric Security for 2022

Predictions in the field of Data-Centric Security for 2022

In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use

Secure Data Collaboration and Control of Information in Use

Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...
File Integrity Monitoring through a Data-Centric Security Approach

File Integrity Monitoring through a Data-Centric Security Approach

In this article, we are going to focus on the concept of information integrity, and more specifically, we will discuss the technologies around what is known as File Integrity Monitoring (FIM) and how a data-centric approach to protection can help us maintain it. Table...
Protecting the three states of data

Protecting the three states of data

When it comes to protecting confidential information, we find that clients require different approaches or pose different protection needs. Some clients need to protect the information on their mobile computers or laptops in case they are lost. Others want to keep...
HOW TO AUTOMATE DATA CLASSIFICATION & PROTECTION

HOW TO AUTOMATE DATA CLASSIFICATION & PROTECTION

ARE YOU OPTIMIZING YOUR CLASSIFICATION STRATEGY? HOW TO AUTOMATE PROTECTION OF CLASSIFIED DATA SEALPATH INTEGRATION WITH DATA CLASSIFICATION SOLUTIONS   More and more documentation in digital format is managed and stored in organizations on file servers, document...