Blog

Blog

Data at rest versus data at creation: It’s not a choice you should make – secure them both

Image As part of your defense against an external cyberattack, you’re ready to tackle the enormous task of securing all the data sitting on your servers, desktops and external drives. If you’re like most organizations, you’ve got tons of it because no one throws anything away these days. And if you’re working at an enterprise, it’s...
Blog

Are your Zoom meetings vulnerable to data leakage?

Image It is estimated that there are more than 1.5 billion people worldwide working remotely today as a result of the current pandemic. Now that you have most, if not all, of your employees working remotely how do you minimize the risk of data breaches or inadvertent exposure of sensitive data? Protecting the network is a good first...
Blog

Fortra’s Data Classification Suite for Outlook on the web built on the Office Add-in platform

Image Fortra’s Data Classification Suite for Microsoft Outlook on the web is a security and governance add-in that enables organizations to ensure consistent and prudent handling of Outlook emails in real time. Fortra’s Data Classification Suite helps Outlook on the web users: Identify and classify emails based on data sensitivity ...
Blog

Data protection for remote workers

Image Working remotely has become the “new normal”, at least for the foreseeable future. Some 1.5 billion people are now working remotely. It seems companies overnight moved into a work-at-home reality, and many workplace experts predict that more and more organizations will continue to rely on remote workers after this pandemic has...
Blog

How do you handle the ticking time bomb of dark data?

Image Organizations of all sizes face a similar challenge: the ticking time bomb of old data. 2020 is expected to be a period of exceptionally rapid data growth, with the growth in demand outstripping growth in storage supply solutions, according to Harvard Business Analytics. Adding to the complexity: 80% of all data organizations...
Blog

NATO: Leading The Way With A Common Classification Standard

Image Data needs to be classified and protected using a common format. By using a common format, we can more easily share and protect our information, as well as and provide ongoing post-release control of the information we have shared. Fortra has worked with sensitive messaging systems in the defense and intelligence environments;...
Blog

Data Classification Tools

Image Data Classification Tools: Why Are They Needed? Data classification tools are becoming more and more of a necessity for businesses and organizations – especially those with increasingly decentralized staff and contractors. The amount of data being sent to and received from different departments and units within your...
Blog

Data Classification: The 5 Steps to Effectively Classify Your Data

Image A corporate data security policy that sets out how valuable information should be handled will be ineffective unless it’s consistently and accurately enforced. Organizations often have a written policy that’s available on their company intranet and handed to new starters. In practice, however, employees are rarely sure how to...
Blog

Meet the latest EPMS requirements — and boost your data security strategy

Have you updated your agency to the Email Protective Marking Standard (EPMS) version 2018.2? As you likely know, changes to the standard went into effect 1 January 2019. Since the last iteration was released in 2010, the EPMS standard has been amended. The changes include updates to the range of security classifications, changes to specific markings and caveat types, as well...
Blog

What is SOX Compliance? 2019 SOX Requirements & More

A definition of SOX Compliance In 2002, the United States Congress passed the Sarbanes-Oxley Act (SOX) to protect shareholders and the general public from accounting errors and fraudulent practices in enterprises, and to improve the accuracy of corporate disclosures. The act sets deadlines for compliance and publishes rules on requirements. Congressman Paul Sarbanes and...
Blog

Better Together – Microsoft AIP and Fortra's Data Classifier

Following on from our first post of the series, What is AIP?, this week we look at how AIP is better when paired with Fortra's Data Classifier, and the business value you will get from this partnership. In the world of enterprise data protection and data classification, the requirement for flexible solutions combining best-of-breed functionality with sophisticated policy...
Blog

Enhancing Microsoft AIP: What is AIP?

Microsoft Azure Information Protection (AIP) provides a data security infrastructure across Microsoft applications, as part of the MS Azure subscription package. AIP is a cloud-based solution which allows you to classify and label Office files and Outlook emails, which in turn drives Microsoft Azure Rights Management (RMS). The underlying aim of AIP is to help organizations...
Blog

The Balancing Act: Education vs Enforcement

Let’s face it – there are very few people in this world who like being told what to do. We often find that suddenly enforcing strict rules and big changes, in both social and working environments, is met with resistance. Questions arise: Why are things changing? Why should I care? What benefit does this have to me? The list goes on… A good deal of human interaction is based...
Blog

At the Leading Edge of NATO Data Centric Security

Fortra Data Classification has been leading the way with Military Messaging Handling Systems (MMHS) using Microsoft Exchange as the core messaging service. This has involved supporting the full evolution of NATO STANAG’s (Standard NATO Agreement) from the early draft revisions through to the latest ratified versions agreed by the member nations. In particular, the STANAG 4406...
Blog

The 5 W’s of Data Identification and Inventory

  Image Eric Vanderburg, Vice President of Cybersecurity at TCDI, highlights the key questions to consider when identifying your organization’s data, its importance and the level of protection required. I always figured that you would need to know what you have in order to protect it. However, I have seen far too many companies...
Blog

GDPR: Effective Approaches for Protecting Personally Identifiable Information (PII) and Sensitive Personal Information (SPI)

Image Many companies are currently in various phases of projects to comply with the European Union’s General Data Privacy Regulation (GDPR) ahead of the May 2018 enforcement deadline. Many vendors and service providers speak generally about GDPR and often, in my view, over simplify solutions to issues that are raised. Rather than try...
Blog

Seven Reasons to Classify Your Data

Image The best way to protect and govern your data is to let it tell your business applications and infrastructure what it contains. Chris Farrelly, General Manager at HANDD Business Solutions, explains how that’s possible and why you should do it A quick Google search on “data, lifeblood, and business” turns up dozens of headlines,...
Blog

Data Classification in Healthcare

Image Healthcare is a highly competitive industry where payers and providers are subject to significant regulatory oversight.  The complex needs of these organizations, and their patients, must be delivered in as efficient a manner as possible, and with precision, while taking every precaution to ensure appropriate levels of data...
Blog

Data Classification as a Catalyst for Data Retention and Archiving

Image Why is Data Retention & Archiving Important? Businesses manage data retention in a multitude of ways for many different reasons, ranging from technical considerations to privacy and liability concerns. The regular considerations are, and will always be, top of mind to include regulatory requirements and compliance, financial...
Blog

Benefits Of Email Classification Software

Image Email classification software gives businesses the ability to classify emails in accordance with their sensitivity. This ensures that you have better control over data, and that confidential information is only shared with intended recipients. Read on to discover more about the benefits of such software in further detail. ...