Our Latest News
Join us as we shed our perspective on data privacy, sensitive file scanning (e.g. PIIs, CUIs), automatic encryption, and the industry as it relates to End Customers, MSPs, market trends, and more.
Insider Threats Defined

Insider Threats Defined

  In the chaotic world of ,data security, insider threats are security breaches that occur as a result of actions taken by authorized individuals within an organization. These actors can range...

read more
Why DLP Deployments Tend To Fail

Why DLP Deployments Tend To Fail

Data security is becoming a board level concern for most businesses that store or use sensitive data. Malicious third party actors are becoming more organized, more sophisticated and bolder in their...

read more
Data Security for the Healthcare Industry

Data Security for the Healthcare Industry

How to meet healthcare data security challenges in a rapidly evolving high tech global healthcare industry. It is difficult to place an accurate financial value on the massive global healthcare...

read more
Data Protection for Financial Services

Data Protection for Financial Services

Data security for financial services is an issue that concerns almost everybody who participates in the modern economy. Anyone using online banking, shopping online, or receiving any kind of...

read more
CMMC Compliance Explained

CMMC Compliance Explained

Choose the Right Tools to Become CMMC Compliant Cybercrime costs are projected to reach an astonishing $10.5 trillion by 2025. The US government is determined to standardize - and actively audit -...

read more
Serving regulated industries as an MSP

Serving regulated industries as an MSP

With the rising threat of cyberattacks looming in virtually every part of cyberspace security has become every MSP’s concern. Besides the standard array of services that MSP provides to regulated...

read more
An interim twist to the CMMC story

An interim twist to the CMMC story

While there is still some time to get onboard and prepare for the CMMC certification, the government released an interim requirement that becomes effective November 30th 2020. nSee...

read more
The Zero Trust Architecture and MSPs

The Zero Trust Architecture and MSPs

  Zero Trust isn’t as new concept in the enterprise space. It was conceptualized in the mid-2000’s, tried by Google (which experience code theft at the time) in the “BeyondCorp” architecture,...

read more
Data or Exploit? Focusing in on the risk.

Data or Exploit? Focusing in on the risk.

MSPs leverage cybersecurity tool stacks (or integrated platforms) to address their customers threat landscape (viruses, malware, ransomware, vulnerabilities and exploits) and to help ensure that...

read more
IT Risks and Insurance

IT Risks and Insurance

Insuring against IT risks in small and medium sized (SME) organizations is becoming more important: The move to the cloud makes the employee endpoints the data hub. Employees download, process and...

read more
Playing the Odds

Playing the Odds

The odds that an unidentified (or unpatched) vulnerability in your network defenses will be exploited by ransomware are no longer negligible. This is dues to the porous nature of modern networks and...

read more
MSPs: Sell better by focusing on DATA

MSPs: Sell better by focusing on DATA

The Blue Ocean for MSP sales and basis of compliance as well as sales in the future will be focused around the DATA. Think I am wrong? Ever since the CEO of Microsoft, Satya Nadella, repeated the...

read more
Scan, Encrypt, Monitor. It’s That Easy.