Curious about the security of your documents in the cloud? You’re not alone. We recently received an email from Dana in Marietta, Ga., who is asking this, "I just read your article on saving documents ...
More of you are encrypting stored data to comply with regulations such as California SB 1386, which is designed to protect consumers’ personal information. But how do you know whether you’ll be able ...
Protecting data during project management is a necessity regardless of the scale of your business. Hackers are constantly on the hunt for any data they can leverage for ransom, sell for profit, or ...
More than 500 data breaches were reported in Australia over the first half of 2025 alone, but there are some ways you can minimise your risk of being caught up in one.
Your personal privacy depends on your awareness, tech controls that allow you to decide what to share, and public policies that take personal privacy into account. When you purchase through links on ...
To encrypt or not to encrypt, that is the question. Well, you should of course be encrypting data in motion particularly where it’s to be carried over a third party network such as the internet or the ...
An Apple-commissioned report this week has highlighted once again why analysts have long recommended the use of end-to-end encryption to protect sensitive data against theft and misuse. The report is ...
As of October 2025, the American Hospital Association had logged 364 healthcare hacking incidents this year. Unbelievably, 100% of the breached data was unencrypted. It was either exposed because ...
Mike Chapple does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their ...
Cybersecurity and data privacy are constantly in the news. Governments are passing new cybersecurity laws. Companies are investing in cybersecurity controls such as firewalls, encryption and awareness ...