Blog

Stay up to date on industry trends, security advice, product news and more.

What Is Sensitive Data? Sensitive Data Definitions, Types & Best Practices

What Is Sensitive Data? Sensitive Data Definitions, Types & Best Practices

Data security and data breaches are recurring topics in the IT world. While it’s vital to keep all data safe from exploitation, it’s even more vital to keep the so-called “sensitive data” safe from exposure. This discourse would expose you to the definition of sensitive data, what makes data sensitive, and how to protect information from exposure, and exploitation.
SharePoint File and Folder Security

SharePoint File and Folder Security

There’s a number of different security levels in the SharePoint as a system. Two of the lowest ones are file security and folder security. Learn more about their differences and how you can operate with them, in this article.
Microsoft Teams Guest Access: To Do or Not to Do?

Microsoft Teams Guest Access: To Do or Not to Do?

With the right tools in place you can ensure internal and guest users can collaborate securely without risking accidental data exposure or loss.
11 Data Security Blogs to Add to Your Summer Reading List

11 Data Security Blogs to Add to Your Summer Reading List

Catch up on data security trends, challenges, tips and products to boost your skills and ensure you're up-to-date on how to protect collaboration with these curated reads.
Data Classification: Definition, Types and Steps to Get Started

Data Classification: Definition, Types and Steps to Get Started

Data classification is an important topic for any company that works with large amounts of data. Learn more about classifying data, types of data classification, examples and data classification framework.
7 Practices to Ensure Compliance with South Africa’s POPI Act

7 Practices to Ensure Compliance with South Africa’s POPI Act

South Africa has created the POPI Act to govern data privacy. Ensure your data security practices comply.
Designing Information Barriers in Microsoft Teams for Real-world Collaboration

Designing Information Barriers in Microsoft Teams for Real-world Collaboration

How to design Information Barriers in Microsoft Teams to restrict specific collaboration, but with enough flexibility to allow other types of communication.
Introducing Advanced Information Protection Capabilities for Microsoft Teams

Introducing Advanced Information Protection Capabilities for Microsoft Teams

Get advanced information barriers, security scopes, private channels, guest access controls and more in the latest release of NC Protect.
Security Testing in SharePoint

Security Testing in SharePoint

Like almost any application that works on the web, SharePoint, in all of its’ versions, has a list of ...
Working from Home Fuels New Data Loss Stats

Working from Home Fuels New Data Loss Stats

Get the facts about this alarming trend and the steps your organization can take to address data loss that has been amplified by working from home.
GDPR Compliance Requirements Checklist and Plan

GDPR Compliance Requirements Checklist and Plan

GDPR is a legal regulation of data processing that relates to citizens of the EU. The regulation might seem overwhelming at first and that is why there are two different requirements checklists to help you inside this article. Improve your GDPR compliance plan using our pieces of advice.
Make Sure Information Protection is Baked into Microsoft Teams from the Start

Make Sure Information Protection is Baked into Microsoft Teams from the Start

Ensure Microsoft Teams information protection success and avoid any pitfalls by making sure you provision sites/teams with these 3 key practices in place.
Learn 4 Tips for Securing Information in Microsoft Teams

Learn 4 Tips for Securing Information in Microsoft Teams

2020 has presented some unique IT and security challenges for organizations. The rapid roll out of technologies ...
Security Roles in SharePoint Architecture: SharePoint Security Matrix

Security Roles in SharePoint Architecture: SharePoint Security Matrix

Security roles in SharePoint represent different levels of permissions and responsibility, from End Users to SharePoint Farm Administrators. Learn more about each of their features and the overall SharePoint security matrix in this article.
See How Your Peers Secure Business-critical Information with NC Protect

See How Your Peers Secure Business-critical Information with NC Protect

See how customers trust NC Protect to protect their business critical data in Microsoft cloud, on-premises and hybrid collaboration apps in this Infographic.
Microsoft Teams vs. Zoom for Secure Enterprise Collaboration

Microsoft Teams vs. Zoom for Secure Enterprise Collaboration

A review of Microsoft Teams vs Zoom features to help companies evaluating the platforms make the best choice for enterprise collaboration and security needs.
SharePoint Security Concerns

SharePoint Security Concerns

TOP SharePoint Security Concerns The introduction of cloud in the modern enterprise changed a lot of things for ...
The Need for Proactive Data Security in the Age of Collaboration and WFH

The Need for Proactive Data Security in the Age of Collaboration and WFH

Why using reactive security solutions instead of tools designed to proactively prevent insiders from misusing or oversharing information won't protect your data.