Blog
What Is the Cybersecurity Maturity Model Certification (CMMC) and Who Does It Apply To?
Mon, 03/27/2023
With CMMC 2.0 likely only months away from coming into effect, getting a head start on CMMC compliance will be key to success. Preparation can begin by implementing a data classification solution, which organizes data into categories, gives you more control over your data, and makes data easier to locate and retrieve
...
Blog
Data-Centric Security: What is it and Why Does it Matter?
By Steph Charbonneau on Mon, 11/29/2021
A data-centric security architecture takes data security a vital step further to protect the actual data from ever-increasing data breach threats.
Blog
Data Privacy vs. Data Security: What’s the Difference?
Tue, 11/09/2021
Learn the Difference between Data Privacy and Data Security. Data privacy can’t happen without layered Data Security measures applied throughout the sensitive Data’s lifecycle.
Blog
A Beginners Guide to Protecting Your Data
By Steph Charbonneau on Wed, 11/03/2021
In this blog, Steph Charbonneau, Senior Director of Industry Strategy at Fortra, talks you through some of the most valuable aspects of data protection and how to measure success of your organizational programs.
Blog
Corporate Data Security Policy: What, Why, and How
By Steph Charbonneau on Tue, 10/12/2021
Creating a corporate data security policy is a “must” in today’s evolving cybersecurity environment. Here’s a few tips on best practices.
Blog
Heads up! New Canadian Data Privacy Act is Around the Corner
By Steph Charbonneau on Tue, 07/06/2021
Canada’s data privacy laws may soon be changing. Brush up on what’s expected to change and how your organization can comply with stronger security safeguards.
Blog
HelpSystems’ (now Fortra's) Steph Charbonneau Discusses Data Security, Corporate Culture, and More
Tue, 06/29/2021
Data security, corporate culture and more are discussed by Fortra’ Steph Charbonneau on popular blog, ModernCTO.
Blog
Key Takeaways from Biden's Sweeping Executive Order on Cybersecurity
Thu, 06/03/2021
Learn more about the key takeaways of the Biden Executive Order, issued on May 12, 2021 and how you can use layered security to mitigate risk.
Blog
How to Meet Biden’s Executive Order on Cybersecurity Requirements
Tue, 06/01/2021
On May 12, 2021, President Biden issued an executive order designed to improve the nation’s cybersecurity and to better protect federal government networks. Learn more about the executive order in our blog.
Blog
Navigating Toward a Password-Free Future with Privileged Access Management
By Bob Erdman on Fri, 09/13/2019
Discover how you can move toward a password-free future with privileged access management (PAM) solutions and adopt a more secure standard for authentication in your organization.
Blog
Staying Ahead of the Curve: Implementing Privileged Access Management Solutions
Fri, 03/22/2019
Find out why Privileged Access Management (PAM) has become such a priority, and why your organization should stay ahead of the curve and adopt a PAM solution.
Blog
Three Signs You've Outgrown Your Password Vault
Mon, 01/28/2019
Watch the vlog to find out the signs to look out for when it’s time to consider adding another type of PAM solution to help your organization as it continues to grow.
Blog
Cyber Risk Ratings: How Would Your IT Environment Score?
By Bob Erdman on Wed, 12/12/2018
Find out the type of cyber threats that endanger organizations (and their ratings), and how they can protect themselves.
Blog
Enterprise Security: Best Practices and Tips
By Bob Erdman on Mon, 12/03/2018
How much security is really necessary to protect yourself? Read on for tips on how to best protect your organization and avoid becoming a headline.
Blog
A Precarious Balance: Privileged Users and The Cloud
By Bob Erdman on Tue, 11/20/2018
When it comes to privileged users, do we maintain security at the cost of productivity, or do we increase productivity at the cost of security?
Blog
The Shared Responsibility of Cloud Security
By Bob Erdman on Fri, 10/26/2018
The agreement that cloud security is a shared responsibility between cloud providers and cloud users has now firmly taken hold. How those responsibilities shake out, however, is an ongoing conversation.
Blog
Are Employees Undermining Your Data Breach Defenses from the Inside?
Fri, 06/29/2018
The latest Verizon Data Breach Report provides a deeper understanding of the internal threats today's organizations face.