Blog

Stay up to date on industry trends, security advice, product news and more.

Sensitive data exposure: causes, detection and mitigation

Sensitive data exposure: causes, detection and mitigation

The modern world is a tech-savvy and digitally enabled in the office and outside of it. So much can be done ...
5 Best Practices for Employee Information Privacy

5 Best Practices for Employee Information Privacy

In this article we'll go over 5 best practices for employee information privacy incl. knowing sensitive data, applying granular encryption, training employees and others.
Introducing Data Discovery, Classification and Security for Nutanix Files

Introducing Data Discovery, Classification and Security for Nutanix Files

NC Protect Now Offers Integrated, AHV Ready Data Discovery, Classification and Security for Sensitive Information in Nutanix Files
5 Ways Remote Work is Putting Your Data at Risk

5 Ways Remote Work is Putting Your Data at Risk

Get the facts about data loss and remote work in this new Infographic, and 4 simple steps your organization can take to address this trend that's been amplified by work from home.
Enhancing Microsoft Information Security with NC Protect

Enhancing Microsoft Information Security with NC Protect

Discover the complementary nature of NC Protect, as well as the value and advanced information protection capabilities it provides Microsoft 365 customers.
Building a Data Classification Scheme and Matrix

Building a Data Classification Scheme and Matrix

A lot of the specific terms like framework, matrix or model might seem like a mystery for a lot of people, especially when it comes to these terms being applied to data classification as a process. This article describes what a data classification matrix is and what the most obvious errors are that you can do when forming a data classification scheme.
What is Sensitive Data? Sensitive Data Definitions, Types & Examples

What is Sensitive Data? Sensitive Data Definitions, Types & Examples

Data security and data breaches are recurring topics in the IT world. While it’s vital to keep all data safe from exploitation, it’s even more vital to keep the so-called “sensitive data” safe from exposure. This discourse would expose you to the definition of sensitive data, what makes data sensitive, and how to protect information from exposure, and exploitation.
SharePoint File and Folder Security

SharePoint File and Folder Security

There’s a number of different security levels in the SharePoint as a system. Two of the lowest ones are file security and folder security. Learn more about their differences and how you can operate with them, in this article.
11 Data Security Blogs to Add to Your Summer Reading List

11 Data Security Blogs to Add to Your Summer Reading List

Catch up on data security trends, challenges, tips and products to boost your skills and ensure you're up-to-date on how to protect collaboration with these curated reads.
Data Classification: Definition, Types and Steps to Get Started

Data Classification: Definition, Types and Steps to Get Started

Data classification is an important topic for any company that works with large amounts of data. Learn more about classifying data, types of data classification, examples and data classification framework.
7 Practices to Ensure Compliance with South Africa’s POPI Act

7 Practices to Ensure Compliance with South Africa’s POPI Act

South Africa has created the POPI Act to govern data privacy. Ensure your data security practices comply.
Designing Information Barriers in Microsoft 365 for Real-world Collaboration

Designing Information Barriers in Microsoft 365 for Real-world Collaboration

How to design Information Barriers in Microsoft Teams to restrict specific collaboration, but with enough flexibility to allow other types of communication.
Security Testing in SharePoint

Security Testing in SharePoint

Like almost any application that works on the web, SharePoint, in all of its’ versions, has a list of ...
Working from Home Fuels New Data Loss Stats

Working from Home Fuels New Data Loss Stats

Get the facts about this alarming trend and the steps your organization can take to address data loss that has been amplified by working from home.
GDPR Compliance Requirements Checklist and Plan

GDPR Compliance Requirements Checklist and Plan

GDPR is a legal regulation of data processing that relates to citizens of the EU. The regulation might seem overwhelming at first and that is why there are two different requirements checklists to help you inside this article. Improve your GDPR compliance plan using our pieces of advice.
Security Roles in SharePoint Architecture: SharePoint Security Matrix

Security Roles in SharePoint Architecture: SharePoint Security Matrix

Security roles in SharePoint represent different levels of permissions and responsibility, from End Users to SharePoint Farm Administrators. Learn more about each of their features and the overall SharePoint security matrix in this article.
See How Your Peers Secure Business-critical Information with NC Protect

See How Your Peers Secure Business-critical Information with NC Protect

See how customers trust NC Protect to protect their business critical data in Microsoft cloud, on-premises and hybrid collaboration apps in this Infographic.
The Need for Proactive Data Security in the Age of Collaboration and WFH

The Need for Proactive Data Security in the Age of Collaboration and WFH

Why using reactive security solutions instead of tools designed to proactively prevent insiders from misusing or oversharing information won't protect your data.