What happens to your data when you die?

Your digital life is only taking on a larger footprint as we embrace the cloud. And while it’s not a fun topic to discuss, it is important to consider what will happen to your data after you die. Here are some of the different types of data you need to consider.

Everyday data disasters and how to prevent them

We live our lives online, always a device within reach. We’re also storing more and more of our personal and professional data online, from banking information and tax returns to family photos and videos. Here are 5 ways your data can be lost and how to keep it safe.

4 real-life examples of data loss

Data loss can affect your business when you least expect it. It can be caused by equipment failure, hacking, or even employee error. These real-life examples of data loss illustrate why it is so important to have multiple data backups and a plan for data restoration.

What we learned from the top data breaches of 2018

Facebook, MyHeritage, Quora, Under Armour, Starwood-Marriott. Each of these companies was breached, but in a different way and with different damage. We have compiled a rundown of these breaches along with our takeaway, so that you can learn from their mistakes.

Why you need a data retention policy

As data storage options have exploded, storage capacities seem limitless. But just because you can keep all your data, doesn’t mean you should. We talked with information governance lawyer Peter Sloan with the Information Governance Group about data security and why you need a data retention policy.

8 critical components of employee cybersecurity training

Employees play a critical role in the cybersecurity of your business. It is essential that they be well-trained and confident in their ability to recognize and respond to cyberthreats. Learn the 8 critical components of your employee cybersecurity training.

How to respond when your business encounters a cybersecurity incident

You’ve discovered an anomaly in your network. Maybe your electricity usage has spiked or an employee fell for a phishing scam. What is the first thing you should do? We talked with incident response expert Peter Enko about the key steps to take after a cybersecurity incident.

A beginner's guide to data security

Whether your business is a large multinational or a small mom-and-pop operation, your data is one of your most important and vulnerable assets. Protect your data from physical loss, corruption, hackers, and security breaches with a data security plan.

Your guide to ransomware: threats, prevention, and recovery

How much do you know about ransomware? Ransomware is a type of malware that takes control of files or systems and holds them hostage. While not a new threat, ransomware attacks have been increasing in recent years. Learn more about what it is, how to prevent it, and what to do if targeted.

The threat of social engineering and how to protect your business

Every day your inbox is bombarded with suspicious emails asking for sensitive personal or business information. Careless responses to these emails can lead to downtime, data breaches, and serious financial loss. Learn the steps you can take to protect your business from these types of attacks.