All You Need To Know about the GLBA Compliance

All You Need To Know about the GLBA Compliance

Although better known for its privacy stipulations, the Gramm-Leach-Bliley Act (GLBA), also called the Financial Modernization Act of 1999, is a US federal law whose original purpose was to allow different types of financial institutions such as banks,...
IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

IS YOUR IDENTITY AT RISK FROM BIOMETRIC DATA COLLECTION?

When classifying the sensitivity of various types of data, few, if any, types of data rank higher in sensitivity than biometric data. Yet, while biometric data is increasingly collected with abandon, this practice is under-scrutinized, pushing us further in the...
What’s New in Endpoint Protector 5.2.0.5

What’s New in Endpoint Protector 5.2.0.5

A new release of Endpoint Protector is available for our clients and it presents the first version of a brand-new feature: Deep Packet Inspection. Currently available for macOS, the new functionality allows network traffic to be inspected for content....
5 Best Practices for PCI DSS Compliance

5 Best Practices for PCI DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security requirements that helps businesses protect their payment systems from breaches, fraud and theft of cardholder data. Developed by the PCI Security Standards Council, PCI DSS...
The importance of BullGuard’s Home Network Scanner

The importance of BullGuard’s Home Network Scanner

BullGuard’s Home Network Scanner monitors your home Wi-Fi network for vulnerabilities that could be exploited by hackers, such as open ports. Why is this important? Port scanning has long been a popular probing tactic among hackers. It is typically used as a...
Reducing Security Risks with Cross-Platform DLP

Reducing Security Risks with Cross-Platform DLP

Nowadays, the majority of businesses work with a mixture of device types and operating systems. Cross-platform Data Loss Prevention (DLP) solutions help diminishing security vulnerabilities in heterogeneous IT environments. Over the past decade, the organizations have...