INFOGRAPHIC:
File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
EZINE:
With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
EBOOK:
In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
ESSENTIAL GUIDE:
Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
EGUIDE:
As organisations generate and store ever-increasing volumes of data, governance of that data has never been more important. In this e-guide, we discuss why good data governance is good business, why it's essential to data security and examine the state of GDPR after its first year being in effect.
EGUIDE:
In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
EGUIDE:
In this e-guide: While many organisations are focusing on the huge fines for non-compliance and the significant financial and reputational costs of data breaches, it is the fact that good data protection and privacy practices builds consumer trust and enables the innovative use of data that should be driving organisations to act.
EGUIDE:
Applying technology like machine learning to transaction data could significantly increase the proportion of money laundering activity that is detected. It is projects like this that are driving demand for data science skills. In this e-guide, read about the power of data against money laundering, and how to get the skills to turn data into gold.
EGUIDE:
Here are 8 tips to think about when creating an e-signing process include cataloging documents requiring signatures, building user stories and determining necessary software features.
EGUIDE:
VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.