3D illustration open trash button yellow files deleted data

Is deleted data ever completed erased?

Being a business leader means that you have to consider how to keep your company’s data secure from loss and data breaches. Keeping data safe doesn’t end when you hit “delete”. It’s vital to know what happens and how to truly wipe data to keep your business and your clients safe.
data management

What happens to your data when you die?

Your digital life is only taking on a larger footprint as we embrace the cloud. And while it’s not a fun topic to discuss, it is important to consider what will happen to your data after you die. Here are some of the different types of data you need to consider.
Data loss symbolized by a rack of hard drives being removed from a blade chassis.

4 real-life examples of data loss

Data loss can affect your business when you least expect it. It can be caused by equipment failure, hacking, or even employee error. These real-life examples of data loss illustrate why it is so important to have multiple data backups and a plan for data restoration.
data breach computer motherboard

What we learned from the top data breaches of 2018

Facebook, MyHeritage, Quora, Under Armour, Starwood-Marriott. Each of these companies was breached, but in a different way and with different damage. We have compiled a rundown of these breaches along with our takeaway, so that you can learn from their mistakes.
data storage limitless data retention policy

Why you need a data retention policy

As data storage options have exploded, storage capacities seem limitless. But just because you can keep all your data, doesn’t mean you should. We talked with information governance lawyer Peter Sloan with the Information Governance Group about data security and why you need a data retention policy.
team of employees responding to a cybersecurity incident

How to respond when your business encounters a cybersecurity incident

You’ve discovered an anomaly in your network. Maybe your electricity usage has spiked or an employee fell for a phishing scam. What is the first thing you should do? We talked with incident response expert Peter Enko about the key steps to take after a cybersecurity incident.
man in front of computer with ransomware attack on the screen

Your guide to ransomware: threats, prevention, and recovery

How much do you know about ransomware? Ransomware is a type of malware that takes control of files or systems and holds them hostage. While not a new threat, ransomware attacks have been increasing in recent years. Learn more about what it is, how to prevent it, and what to do if targeted.
social engineering phishing attacks

The threat of social engineering and how to protect your business

Every day your inbox is bombarded with suspicious emails asking for sensitive personal or business information. Careless responses to these emails can lead to downtime, data breaches, and serious financial loss. Learn the steps you can take to protect your business from these types of attacks.
corporate culture team high five

Is corporate culture putting your business at risk?

Every workplace has unspoken rules and ideas that make up the fabric of their corporate culture. But this culture could be putting your business at risk. Learn what an ideal corporate culture looks like and why it should be part of your cybersecurity strategy.
Cyber Insurance

The SMB owner’s introduction to cyber insurance

It’s predicted that the annual cost of cybersecurity crimes will reach $6 trillion by 2021. Here’s the good news. There’s a lot you can do to protect your company. In this article, we’re going to explore one more way to keep your data and your bottom line safe: cyber insurance.