Blog

Stay up to date on industry trends, security advice, product news and more.

Complacency is Your Biggest Data Breach Risk: 5 Steps to Avoid It

Complacency is Your Biggest Data Breach Risk: 5 Steps to Avoid It

The ICO has stated that Complacency is a company’s biggest data breach risk. Take these 5 Steps to avoid data security complacency and a potential breach.
Join us at ESPC 22 in Copenhagen this November

Join us at ESPC 22 in Copenhagen this November

We are excited to share that archTIS is a Gold Sponsor and exhibitor at ESPC 22 in Stand #26, November 28 - December 3, 2022, in Copenhagen. Discover what we will be showcasing at this year's live in-person event.
Encrypting SharePoint List Columns

Encrypting SharePoint List Columns

Tips for managing access to and encrypting SharePoint List Columns to prevent unauthorized viewing of and access to sensitive column values.
4 Steps for Defining Data Classification Levels and Policies

4 Steps for Defining Data Classification Levels and Policies

Data classification is an important business process. Learn 4 important steps to build a data classification policy and automate enforcement.
Encryption Key Management in Microsoft 365

Encryption Key Management in Microsoft 365

Learn how to improve encryption and key management processes in collaboration tools including the Microsoft 365 suite.
What is FIPS 140-2?

What is FIPS 140-2?

Understanding NIST’s FIPS 140-2 security requirements for cryptographic modules including encryption software.
Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

Protecting DOD controlled unclassified information (CUI) from getting into the wrong hands

CUI, which is maintained in government and contractor systems, is often a target and a cyber risk for the DOD, but the process of labeling and classifying CUI can be a complex endeavor. Learn how to tag, mark and protect it.
NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

NC Protect Named 2022 Policy Management Solution of the Year in the Cybersecurity Breakthrough Awards

We are excited to share that archTIS' NC Protect product has been named 2022 Policy Management Solution of the Year in the 6th annual Cybersecurity Breakthrough Awards.
How to Optimize Governance and Data Security in Microsoft 365 and Teams

How to Optimize Governance and Data Security in Microsoft 365 and Teams

Discover how dynamic data security that enforces governance more effectively secures collaboration in M365 and Teams without impacting productivity.
Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing NC Encrypt – Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server

Introducing Independent Encryption Key Management and BYOK Support for Microsoft 365 and SharePoint Server for NC Protect Users.
As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

In this ITWeb interview, archTIS Governance & Compliance expert Dave Matthews discusses the topic of ABAC vs RBAC: How to create more efficient data security and avoid permission creep. 
US DoD’s Adoption of Zero Trust Heats Up

US DoD’s Adoption of Zero Trust Heats Up

Understanding how Attribute-Based Access Control (ABAC) extends the zero trust security model to the data level to improve the security of classified and sensitive information.
When Should You be Using Encryption?

When Should You be Using Encryption?

To Encrypt or Not to Encrypt? Read our tips on when to use encryption and other steps you can take to protect sensitive data.
Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

Introducing Kojensi SaaS v2.0 with New Export Control Material Capability for ITAR

The new export control material capability in Kojensi SaaS v2.0 assists supply chain organisations with the management of U.S. International Traffic in Arms Regulations (ITAR) regulated information, including Controlled Unclassified Information (CUI).
Singapore’s PDPA Penalties Set to Increase Starting Oct 1

Singapore’s PDPA Penalties Set to Increase Starting Oct 1

What you need to know for the next phase of PDPA and how to ensure your information security practices are compliant to avoid penalties.
Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Discovering and Protecting Sensitive Data in M365 and SharePoint On-Premises

Explore 5 practical use cases for discovering and protecting sensitive data in M365 and SharePoint on-premises with NC Protect.
Controlled Unclassified Information (CUI) Marking Requirements & Management in M365

Controlled Unclassified Information (CUI) Marking Requirements & Management in M365

With renewed focus on protecting CUI and several regulations the government is handling, including CMMC 2.0, understanding the controlled unclassified information marking requirements and DoD guidelines is critical.
Tips for Managing Unstructured Data Security

Tips for Managing Unstructured Data Security

Explore the unstructured data security and protection controls needed to ensure only the right users have access to the right content at the right time.