All Data Security. All the time.

The right resource for decision makers and IT admins

Data Security and Windows: Dealing with the Challenges and the Myths

August 19, 2019 Data Loss Prevention
by: August 19, 2019

Since it was launched in 1985, Microsoft Windows has been the dominant operating system for endpoints the world over. And while its popularity has waned in recent years, as macOS pushed into the enterprise and Linux released…

10 Data Protection Regulations You Need to Know About

August 14, 2019 Compliance
by: August 14, 2019

Concerns about privacy and protecting personal information are in the spotlight for organisations all over the world. New, more comprehensive data privacy laws have been enacted or proposed in the past few years and it has

5 Mistakes Companies Make When Securing Their Endpoints

August 9, 2019 Endpoint Protection
by: August 9, 2019

With the rising tide of data protection regulations and the continuous onslaught of malicious attacks that have swept the globe, data protection has become a mandatory part of every company’s security strategy. But as organizations…

Collaboration Security: How to Safeguard Workstream Collaboration Data?

by: August 8, 2019

With the widespread adoption of workstream collaboration (WSC) platforms among businesses, it is essential to take into account to balance security against end-user productivity and collaboration.

Communication in…

LGPD vs. GDPR: The Biggest Differences

August 2, 2019 Compliance
by: August 2, 2019

Brazil passed its comprehensive general data protection law, the Lei Geral de Proteção de Dados (LGPD) on 14 August 2018. Tailored on its European cousin, the General Data Protection Regulation (GDPR), the new legislation…

Endpoint Protector KEXTs Notarized by Apple

July 31, 2019 Macs in the enterprise
by: July 31, 2019

With the release of the macOS Mojave 10.14.5, Apple has introduced a new security feature called kernel extension (KEXT) notarization. This marks a significant change in the way third-party kernel extensions are handled,…

5 Reasons Healthcare Institutions Need Data Loss Prevention

July 26, 2019 Data Loss Prevention
by: July 26, 2019

Health information has always been considered extremely sensitive and with the rise of digital healthcare records, the need for its protection has become increasingly urgent. Due to the high volume of data they collect …

What’s New in Endpoint Protector 5.2.0.6

July 24, 2019 Endpoint Protection
by: July 24, 2019

The new version of Endpoint Protector is out and is set to deliver a new series of improvements and upgraded features. This article lists the most important updates and enhancements of Endpoint Protector 5.2.0.6 that are …

Linux and Data Security: The Myths, Challenges and Solutions

July 18, 2019 Data Loss Prevention
by: July 18, 2019

Linux has come a long way since its humble beginnings as Finnish student Linus Torvalds’ pet project. With over 25 million lines of code to its name in 2018 and its rise as the OS of choice for servers, public cloud and supercomputers,…

The US States Taking the CCPA Road

July 12, 2019 Compliance
by: July 12, 2019

Data protection legislation has become a global trend. Following the adoption of the EU’s General Data Protection Regulation (GDPR), countries across the world from Australia and Japan to Brazil and Canada have adopted…