Case Study
Delivering Information Security For Guildford Borough Council
Guildford Borough Council was judged an ‘Excellent’ council by the Audit Commission. The Business Systems team is a relatively new service with a broad remit including ICT, information management, offices and facilities, whose aim is to provide people with a ‘good way to work’ both now and in the future. There are 45 people within the team who manage over 800 users across 15 different services.
...
Blog
The 5 Steps to Effective Data Classification: Identify Your Crown Jewels
By Chris Brook on Mon, 10/16/2023
The 5 Steps to Effective Data Classification:
Identify your sensitive and high value data
Discover the location and accessibility of your sensitive data
Classify data according to its value to the organization
Secure: employee security control and protection measures
Monitor: measure and evolve security practices
Using data...
Blog
Data Classification in Finance
Thu, 09/28/2023
Why should the financial services sector adopt a data classification strategy?
Because more than nine out of ten (95%) of data breaches are financially motivated, according to this year’s Verizon Data Breach Investigations Report. Within the finance and insurance sector specifically, the rates were as high as 97% — no surprise there.
However, what may be surprising is that most of these...
Blog
Data Classification in the Finance World
By Fortra Staff on Thu, 09/28/2023
When it comes to data privacy, financial services is one of the most highly regulated industries, and as a result, finance organizations face immense pressure to protect the data they are creating, collecting, and storing. Let’s take a deeper dive into what pressures are put on financial organizations to protect their data, and what they can do to...
Datasheet
Fortra Data Classification Solutions Overview
Secure Your Information, So People Can Work with ConfidenceData is everywhere and protecting it is becoming more difficult than ever. Fortra Data Classification enables you to establish a policy driven foundation that helps you identify and classify sensitive data at creation, in motion, or at rest and apply the right security policy to protect it.Data Protection That Works.Put your information...
Blog
Complying With the Export Administration Regulations (EAR): Everything You Need To Know
By Robbie Araiza on Thu, 06/15/2023
The Export Administration Regulations (EAR) are a set of regulations administered by the U.S. Department of Commerce to control the export of certain goods and technologies from the United States for reasons of national security and foreign policy. Here is a breakdown of the essentials your organization should know for proper compliance.
The Export...
Blog
What Is the Federal Risk and Authorization Management Program (FedRAMP)?
By Robbie Araiza on Thu, 04/06/2023
An Introduction to FedRAMP
In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program (FedRAMP), noting that “[in the two years prior], the Administration worked in close collaboration with the National Institute of Standards and...
Blog
What Is ISO 27001 and How Can It Help Your Organization?
By Chris Brook on Thu, 03/30/2023
What Is ISO 27001?ISO 27001, also known as ISO/IEC 27001, is a widely recognized international standard that defines best practices for implementing and managing information security in an Information Security Management System (ISMS).Since it was first developed, the goal of the standard has been to provide a model for establishing, implementing,...
Blog
Lookout and Fortra Partner to Secure Sensitive Data Across the Enterprise
By Corey Markell on Thu, 12/01/2022
Editor’s Note: This blog post was co-authored by Clayton Barnard, Senior Director, Global Alliances at Lookout, and Corey Markell, Associate Director, Strategic Resource Group at Fortra.
The first steps for any organization in creating a data security strategy are accurately identifying all of their sensitive information and securing that data from...
Blog
Data Protection Myths and the Truths Behind Them
By Fortra Staff on Thu, 10/13/2022
To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially problematic when...
Blog
Embracing Data Privacy Regulations to Earn Consumer Trust
By Fortra Staff on Fri, 09/23/2022
Trust is one of the most important aspects of business, especially when it comes to the collection and use of people’s personal data. As consumers advocate for organizations to take more precautions in handling their personal data, legislative bodies are listening, and more data privacy regulations are being passed globally each year. Being...
Blog
Guarding Against Insider Threats
By Fortra Staff on Thu, 09/15/2022
When you see or hear the term “data breach” in the media, is the first thought that there must have been a hacker involved? It may surprise you to know that hackers aren’t the main cause of data loss and data breaches within organizations. Most can be attributed to insider threats, mainly by employees just trying to do their job who make a negligent...
Blog
Comparing GDPR and CCPA
By Fortra Staff on Mon, 07/25/2022
The GDPR in Europe was one of the first major data privacy regulations to be implemented in recent times, followed closely by the CCPA in the United States. And since its enforcement, GDPR has been seen as the “gold standard” when it comes to data protection regulations. However, it is important to remember that each data privacy regulation has...
Blog
The Cost and Consequences of Exposed PII
By Fortra Staff on Fri, 06/24/2022
Hardly a day goes by without a media report about a data breach that involves exposed personally identifiable information (PII). In the same way an organization takes care of its employees, customers, and finances, it also needs to ensure its sensitive data, such as PII, is well protected. Let’s explore what constitutes as PII, the consequences of...
Blog
Classification in the Cloud
By Fortra Staff on Thu, 05/26/2022
Cloud-based work environments are both convenient and cost-effective, especially in today’s remote world, but can present a challenge when it comes to meeting both regulatory compliance requirements and ensuring the protection of sensitive data. In order to maintain the protection of sensitive data when moving to and from the cloud, a consistent...
Blog
Data Classification: The Impact on a Zero Trust Framework
By Fortra Staff on Thu, 05/12/2022
At first glance, it appears that data classification and Zero Trust, a cybersecurity framework, would have nothing to do with one another. After all, each has its own separate specialized function – data classification labels data based on sensitivity, and Zero Trust is meant to keep unauthorized users from gaining access to company systems and data...
Blog
Data Protection In A World Of Ever-Increasing Privacy Regulations
By Fortra Staff on Wed, 03/16/2022
Data privacy regulations have really come into play over the last four years. Consumers are becoming more concerned about the disclosure and use of their data and trust is playing a key role. According to a survey conducted by Salesforce, 48% of consumers said they had lost trust in brands during the pandemic due to misuse of personal information....
Blog
The Importance of Automation in Data Classification
By Fortra Staff on Wed, 02/23/2022
It’s no surprise to anyone that the amount of data that exists is rapidly growing. A report by IDC predicts that by 2025, the global datasphere will have grown to 175 zettabyes. To put in perspective how much data this truly is, one zettabyte is equal to one trillion gigabytes – that is an astronomical amount of data. Needless to say, humans are not...