Blog

Stay up to date on industry trends, security advice, product news and more.

3 File Share Security Flaws Putting Sensitive Data at Risk

3 File Share Security Flaws Putting Sensitive Data at Risk

Discover why traditional approaches to file share security are no match for modern security threats and what to do about it.
Understanding and Assessing GDPR Compliance Risks

Understanding and Assessing GDPR Compliance Risks

GDPR compliance is a complicated process that involves a lot of areas, mostly connected with data security and privacy. There’s also a lot of compliance-related risks that should be given priority when working on your compliance to GDPR. Find out more in this article.
Secure Collaboration, Is That Possible?

Secure Collaboration, Is That Possible?

We dig into the challenges of secure collaboration with the shift to remote work, proliferation of collaboration channels, and growing insider threats.
9 Ways Data Vampires Are Bleeding Your Sensitive Information

9 Ways Data Vampires Are Bleeding Your Sensitive Information

Beware! The mass conversion to remote work and adoption of new collaboration tools leave sensitive information at risk from data vampires.
NC Protect Named Data Security Innovation of the Year

NC Protect Named Data Security Innovation of the Year

Nucleus Cyber’s NC Protect received the 2020 CyberSecurity Breakthrough Award for Data Security Innovation of the Year.
Why Email is the Biggest Security Vulnerability of All

Why Email is the Biggest Security Vulnerability of All

Why email, arguably the most commonly used collaboration tool, poses biggest data security threat from your insiders, plus email data loss prevention tips.
Five Risky Misconceptions About Intellectual Property Theft

Five Risky Misconceptions About Intellectual Property Theft

IP theft can have dire consequences to the survival of your company. Despite this knowledge, there are five serious misconceptions about Intellectual Property Theft that are putting your organization at risk.
Nucleus Cyber is Now Microsoft IP Co-sell Ready!

Nucleus Cyber is Now Microsoft IP Co-sell Ready!

As a IP Co-sell Ready Microsoft partner, our NC Protect solution will be jointly sold with Microsoft sales teams and in Microsoft’s commercial marketplace so it is more readily available through the Microsoft sales and partner ecosystems.
How to identify and protect personal information

How to identify and protect personal information

Handling a person’s personal information is a delicate and daunting task. Learn how to identify and protect personal information.
Data Classification Policy: Examples and Templates

Data Classification Policy: Examples and Templates

Data classification policy is an essential part of any company’s security system, defining the proper protection measures and the risks associated with exposing the data in question. Learn more about data classification policies in this article.
Fix the Top 5 Missing Microsoft Teams Collaboration Features that Impact Data Security

Fix the Top 5 Missing Microsoft Teams Collaboration Features that Impact Data Security

Here's 5 feature gaps that impede secure Microsoft Teams collaboration and how to plug them and put an end to IT and user frustrations – immediately and seamlessly.
Sensitive data exposure: causes, detection and mitigation

Sensitive data exposure: causes, detection and mitigation

The modern world is a tech-savvy and digitally enabled in the office and outside of it. So much can be done ...
5 Best Practices for Employee Information Privacy

5 Best Practices for Employee Information Privacy

In this article we'll go over 5 best practices for employee information privacy incl. knowing sensitive data, applying granular encryption, training employees and others.
Introducing Data Discovery, Classification and Security for Nutanix Files

Introducing Data Discovery, Classification and Security for Nutanix Files

NC Protect Now Offers Integrated, AHV Ready Data Discovery, Classification and Security for Sensitive Information in Nutanix Files
5 Ways Remote Work is Putting Your Data at Risk

5 Ways Remote Work is Putting Your Data at Risk

Get the facts about data loss and remote work in this new Infographic, and 4 simple steps your organization can take to address this trend that's been amplified by work from home.
5 Tips for Securing Guest Access in Microsoft Teams

5 Tips for Securing Guest Access in Microsoft Teams

Join Nucleus Cyber’s Steve Marsh for a webinar on the challenges, best practices and tools to Secure Guest Access in Microsoft Teams Wednesday, Aug 26 @ 2:00pm ET.
Enhancing Microsoft Information Security with NC Protect

Enhancing Microsoft Information Security with NC Protect

Discover the complementary nature of NC Protect, as well as the value and advanced information protection capabilities it provides Microsoft 365 customers.
Building a Data Classification Scheme and Matrix

Building a Data Classification Scheme and Matrix

A lot of the specific terms like framework, matrix or model might seem like a mystery for a lot of people, especially when it comes to these terms being applied to data classification as a process. This article describes what a data classification matrix is and what the most obvious errors are that you can do when forming a data classification scheme.