How to Protect Your Data in 2020?

How to Protect Your Data in 2020?

In 2020 data protection is no longer an option. Companies can’t ignore mitigating the risk of targeted or accidental data leaks or hope they won’t suffer a data breach. The number of cyberattacks is increasing every year and with the rising tide of regulations, data...
Data Protection Legislation around the World in 2020

Data Protection Legislation around the World in 2020

2020 is set to become a momentous year for data protection legislation across the globe, with the enforcement of the California Consumer Privacy Act (CCPA) likely to grab headlines and set the tone for further US legislation at the state and federal level. New data...
Safetica 9.1: Sensitive Data and Cloud E-mail Under Control

Safetica 9.1: Sensitive Data and Cloud E-mail Under Control

A brand new version of your sensitive data protection solution, Safetica 9.1, is coming! Today, we’ll show you how to discover risks on Office 365 Exchange Online. With the help of new rules, you can now better identify sensitive content in your business, and there...
3 Steps to Protect Intellectual Property

3 Steps to Protect Intellectual Property

Intellectual Property (IP) is one of the most critical assets that organizations have and in order to protect it, a coherent cybersecurity strategy is needed. Intellectual property comes in various formats including business plans, software code, product designs,...
The Cost of a Data Breach at the End of 2019

The Cost of a Data Breach at the End of 2019

In the last six years, the global average cost of a data breach has grown by 12%, totaling $3.92 million/breach in 2019 according to this year’s Cost of a Data Breach Reportreleased by the Ponemon Institute and IBM Security. Lost business was the biggest...
Internet pioneer praises Google for doing DNS-over-HTTPS the right way

Internet pioneer praises Google for doing DNS-over-HTTPS the right way

Last week, we spoke about the ongoing battle for internet privacy with the rollout of the new DNS-over-HTTPS (DoH) protocol. DoH encrypts the traffic between a browser and a DNS provider, ensuring that when you type a URL into your browser, it is resolved to the...