Category: Blogs
-
WHAT ARE THE 5 HIPAA RULES?
Businesses that handle PHI (Protected Health Information) are governed by HIPAA (the Health Insurance Portability and Accountability Act): a wide-ranging set of rules that help to keep individuals’ sensitive information from being disclosed. In a recent blog, we uncovered what HIPAA compliance is, and why the regulations can present significant challenges to almost any organization.…
-
WHY DATA PROTECTION PLATFORMS ARE ESSENTIAL TO DATA LOSS PREVENTION
Organizations collect volumes of data, some of which are valuable as intellectual property, and some of which contain sensitive information from their customers or business partners. Organizations have both a motive and a responsibility to always protect that data, whether it is in storage, in transit, or in use. However, protecting data as it rests…
-
THE EXPLAINER: FOUR WAYS DATA PRIVACY IS GOOD FOR BUSINESS
1. Data Privacy Comes from Protected Data Data breaches are all but inevitable, but that doesn’t mean hackers have to win. When organizations make a whole-hearted effort to protect personal and other critical data, the sensitive elements will be worthless in the hands of cybercriminals—in turn, making protected data private data. To effectively protect data,…
-
BUILDING A SECURE INTERNAL DATA MARKETPLACE WITH PROTEGRITY AND AWS
Building a Secure Internal Data Marketplace with Protegrity and AWS As businesses increasingly look to make data part of their decision making process, many face issues when it comes to the quality, reliability, and privacy of that data. In the modern enterprise tech stack, data is often siloed and stored across a range of applications.…
-
UNICODE: NAME A LANGUAGE, AND WE’LL PROTECT THE DATA
Data is international currency. No matter the language, kinetic data empowers businesses around the world to develop products and services, and to answer customers’ needs. While data is indeed valuable in many ways, it must be made worthless in the hands of cybercriminals. That means data protection should also be universal. No matter the language,…
-
THE BUSINESS EXPLAINER: ENCRYPTED HEALTHCARE DATA DIMINISHES RANSOMWARE RISK
How Serious is Ransomware to Your Healthcare Organization? Serious enough that you should consider immediately protecting PHI and other sensitive data through encryption. When data is encrypted, it’s unreadable and worthless to cybercriminals, but still accessible to authorized users. More than 90 percent of all healthcare organizations suffered at least one security breach in the…
-
GAINING A SENSE OF SECURITY ABOUT SECURE DATA AND ALGORITHMS
There’s an overwhelming temptation to view cybersecurity through a conventional lens: that tossing more devices and software solutions at it will somehow improve it. Yet, as digital technology evolves and artificial intelligence (AI) matures, this thinking falls woefully short. The ability to secure AI and machine learning (ML) data, along with the algorithms used in…
-
THE EXPLAINER: FIVE WAYS TO STOP RANSOMWARE
1. Know What Kind of Sensitive Data You Have and Where It Is Data is kinetic; it’s everywhere and never stops coming. It’s often created through new business processes and applications in the cloud and on-premises systems that can go unnoticed in larger data-discovery efforts. You can’t protect what you don’t know you have. That’s…
-
SURVEY SAYS: DATA INNOVATION OFTEN SLOWED BY COMPLIANCE AND OTHER TECH CONCERNS
We always want to know how organizations are aligning data-driven progress with the strengths and constraints of their technologies. That’s why we surveyed more than 600 executives in the U.S., including 382 security and privacy executives and 228 data and AI executives, to understand how we can continue to safeguard data as businesses continue to…
-
PROTEGRITY ANNOUNCES AVAILABILITY ON AWS MARKETPLACE
It truly does take a village (of technologies) to make a business prosper. Between a long list of on-premises hardware and cloud-based networks, servers, and applications, organizations can’t get ahead without relying on many technology vendors. In our mission to protect the data of large Fortune 500, mid-sized, and up-and-coming companies, we recognize the importance…