Data Security Archive

Elevating Data Risk Management to the Board Level

Elevating Data Risk Management to the Board Level

For many, data risk management and cybersecurity is something like climate change—the facts are widely accepted, but the solution is much more elusive.

 
Best Practices to Prevent Data Breaches

Best Practices to Prevent Data Breaches

These recommendations can help companies and individuals protect their assets and operations from data breaches.

 
Overcoming the Fear of Data Remediation

Overcoming the Fear of Data Remediation

Companies often fail to realize that informed data deletion is a key tool for reducing risk.

 
Data Privacy Checkup

Data Privacy Checkup

As health care organizations capitalize on big data, they must minimize the risks that come with sharing patient information.

 
The Real Data at Risk

The Real Data at Risk

Loss of intellectual property can have catastrophic implications, but many businesses may be overlooking the risk.

 
IT Execs Doubt Their Companies’ Data Security

IT Execs Doubt Their Companies’ Data Security

A quarter of security and IT executives worldwide would not trust their own company to store and manage their personal data.

 
Managing Data Protection in Higher Education

Managing Data Protection in Higher Education

Colleges and universities increasingly face data security challenges.

 
Data Legislation Patchwork

Data Legislation Patchwork

Despite a number of recent high profile data breaches, efforts to establish national standards for data security have failed.

 
The Risk of Keeping Too Much Data

The Risk of Keeping Too Much Data

A “save everything” data retention strategy exposes companies to compliance, legal and business risks.

 
Password Apathy

Password Apathy

Few employees — even IT employees — are vigilant about using adequate passwords.

 
Three Ways to Stay Ahead of the SEC Cyberthreat Disclosure Mandate

Three Ways to Stay Ahead of the SEC Cyberthreat Disclosure Mandate

The SEC is now mandating companies to disclose their cybersecurity vulnerabilities. Here are three ways to stay out of related disputes.

 
Data Security in the Age of WikiLeaks

Data Security in the Age of WikiLeaks

To avoid being part of the next major data breach, protect information at the document level.

 
The Perils of Email: Navigating the Legal Risks

The Perils of Email: Navigating the Legal Risks

Email may have simplified business but it can create a host of critical legal issues.

 
The Growing Wave of Data Breach Litigation

The Growing Wave of Data Breach Litigation

The data breach threat has expanded from the tech world into the courtroom.