The Information Protection Blog
Articles and Guides about: Data Protection for Business, Cybersecurity Regulations and Compliance, SealPath Features and Integrations and many more...The real impact of ransomware on businesses
Some years ago we saw how a new wave and trend in ransomware attacks. In the attacks on the City of Pensacola and the New Jersey synagogue, not only had the data been encrypted, it had been exfiltrated and the attackers were demanding a ransom for not making it...
What is the Zero Trust Security model? How to implement this strategy with SealPath?
The network perimeter doesn't exist... Don't trust anyone! What is the Zero Trust model? The Zero Trust security model, devised by a Forrester analyst and evolving over the last decade, is based on the premise that the barrier between what is reliable and what...
Who should encrypt the data in my company?
The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...
TISAX® Compliance, Certification & a Data-Centric Security Approach
TISAX, Trusted Information Security Assessment Exchange, is the automotive industry standard certification that consists of three levels. In the following article you will learn what is Tisax, why you should get the certification, who does TISAX apply to, the process,...
3 Ways to Lock CAD files and Protect Companies Drawings
AutoCAD files contains sensitive information that should be locked to some recipients or protected from editing. Often, companies need to share some CAD drawings with a team of professionals who work collaboratively to improve the designs, framework, or content. But...
How to calculate the cost of a data breach – A Case Study
Every day there are news related to companies and public organizations that have suffered a data breach due to an external attack, human error, or negligent actions on the part of employees or former employees. We see that around these news there is data that the...
PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX
Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...
5 Data protection use cases using automation and integration between security technologies
This article will dive into 5 use cases of data protection automation and integration between data-centric security technologies. These integration cases can make 1 + 1 > 2 in terms of the advantages to maximize protection compared to having a single isolated...
Data Processing Agreement, International Transfers and Regulations
In this article we will discuss the implications of the Personal Data Processsing Agreement (DPA) required by the Regulation. This have recently become particularly relevant, more specifically, about data transfers to countries outside the European Union where the...
Predictions in the field of Data-Centric Security for 2022
In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...
Secure Data Collaboration and Control of Information in Use
Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...
File Integrity Monitoring through a Data-Centric Security Approach
In this article, we are going to focus on the concept of information integrity, and more specifically, we will discuss the technologies around what is known as File Integrity Monitoring (FIM) and how a data-centric approach to protection can help us maintain it. Table...