The Information Protection Blog

Articles and Guides about: Data Protection for Business, Cybersecurity Regulations and Compliance, SealPath Features and Integrations and many more...
The real impact of ransomware on businesses

The real impact of ransomware on businesses

Some years ago we saw how a new wave and trend in ransomware attacks. In the attacks on the City of Pensacola and the New Jersey synagogue, not only had the data been encrypted, it had been exfiltrated and the attackers were demanding a ransom for not making it...

read more
Who should encrypt the data in my company?

Who should encrypt the data in my company?

The encryption of data in companies prevents information leaks and mitigates the cost of its impact. It is one of the best security solutions to protect sensitive information, but you must know what documents to encrypt and how to implement it effectively. Table of...

read more
3 Ways to Lock CAD files and Protect Companies Drawings

3 Ways to Lock CAD files and Protect Companies Drawings

AutoCAD files contains sensitive information that should be locked to some recipients or protected from editing. Often, companies need to share some CAD drawings with a team of professionals who work collaboratively to improve the designs, framework, or content. But...

read more
How to calculate the cost of a data breach – A Case Study

How to calculate the cost of a data breach – A Case Study

Every day there are news related to companies and public organizations that have suffered a data breach due to an external attack, human error, or negligent actions on the part of employees or former employees. We see that around these news there is data that the...

read more
PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

PROTECTION OF SENSITIVE FILES AND SECURE FILE SHARING IN BOX

Many companies store their corporate documentation and collaborate daily through Box. Users access and share files easily, but in many cases the documents shared with third parties contain confidential information, losing absolute control of the information and the...

read more
Predictions in the field of Data-Centric Security for 2022

Predictions in the field of Data-Centric Security for 2022

In recent weeks, various analysts such as Gartner, Forrester, and IDC have examined cybersecurity trends and predicted what the future would hold. A majority of these trends overlap, so we want to echo those that relate to data-centric security in this article. Table...

read more
Secure Data Collaboration and Control of Information in Use

Secure Data Collaboration and Control of Information in Use

Secure data collaboration brings great value to companies, through the exchange of data between business partners we can help grow the business, but it also involves exposing the company to a great risk such as data leakage and lose of control. In this article we...

read more