Browsed by
Category: Data Access Governance

Best Practices for Storage Reclamation – Part 3 of 3

Best Practices for Storage Reclamation – Part 3 of 3

In parts 1 and 2 of this blog series, we introduced the key elements of a storage reclamation program and dove deeply into 5 key capabilities that would be needed.  In this last blog, we pull all of the guidance together and wrap up the discussion. Putting It All Together With the five key capabilities addressed in the earlier blogs, any organization can be prepared to put together a comprehensive file cleanup workflow.  While no two organizations are alike, a…

Read More Read More

Best Practices for Storage Reclamation – Part 2 of 3

Best Practices for Storage Reclamation – Part 2 of 3

In part 1 of this series, we explained that there are 5 key capabilities needed for a successful file cleanup project, and discussed Capability 1 – File Discovery, and 2 – Sensitive data discovery.  In this second blog we pick up the discussion with Capability 3 – Activity and File Usage. Capability 3 – Activity and File Usage Understanding who is actively using files on file servers can offer tremendous insight into how to approach a cleanup effort.  By monitoring…

Read More Read More

Best Practices for Storage Reclamation – Part 1 of 3

Best Practices for Storage Reclamation – Part 1 of 3

Data Access Governance (DAG) has many different types of use cases, with most falling into three main categories: data security, regulatory compliance, and operational efficiency.  There has been a lot written about security due to the increasing frequency of ransomware attacks, and a lot is being written about compliance, most recently around privacy – but we haven’t talked much about the operational efficiency use case. A good DAG program allows organizations to manage more data with fewer people and to…

Read More Read More

Top Five Ways You End Up With Open Shares: Part 2

Top Five Ways You End Up With Open Shares: Part 2

In the first post of this series, we explored two ways you can end up with dangerous open shares. Open shares are essentially folders that everyone in your company can access. Sharing what is in those folders isn’t a threat by itself, but securing those documents can be tough. In this post, we’ll discuss three equally important, but less common ways to end up with dangerous open shares. Learn more about open shares here. Reason 3: End Users Are Given…

Read More Read More

Top Five Ways You End Up With Open Shares: Part 1

Top Five Ways You End Up With Open Shares: Part 1

Open shares are evil. Sure, there are cases you may need a read-only share open to everyone in the organization. How else will they grab benefits forms or company calendars to print and hang in their cubes? But it’s amazing how often those simple use cases grow into ugly messes. All it takes is one person with the right (or wrong) rights to add write access to that same share, and you have a huge problem. Learn more about open…

Read More Read More

ProTip: Create PII Retention Policies in O365 to Help Abide with GDPR Guidelines

ProTip: Create PII Retention Policies in O365 to Help Abide with GDPR Guidelines

Automate the Process of Disposing of Data With GDPR now in effect, organizations are legally required to remove personal data once its purpose for processing has been met. In March of 2019 a Danish Taxi company, Taxa 4×35, was fined $180,000 for failing to properly dispose of its customer’s personally identifiable data (PII). An audit found that the company was only removing the customer’s name from the documents, however other personally identifiable information such as telephone numbers and address’ remained….

Read More Read More

GDPR – One Year Later…

GDPR – One Year Later…

The penalty for failure to comply with the General Data Protection Regulation (GDPR) is up to $22 million or 4% of annual global turnover (whichever is greater). By now most organizations around the globe know that regardless of where they are based, this regulation affects them if they are doing business with EU citizens. Aside from having a responsibility to properly handling personal data, that amount of money can really hurt your business. For example, under the Data Protection Act of…

Read More Read More

Database Security Best Practices – Simple & Worthwhile Concepts – Part IV

Database Security Best Practices – Simple & Worthwhile Concepts – Part IV

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

Database Security Best Practices – Simple & Worthwhile Concepts – Part III

Database Security Best Practices – Simple & Worthwhile Concepts – Part III

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

DATABASE SECURITY BEST PRACTICES – SIMPLE & WORTHWHILE CONCEPTS – PART II

DATABASE SECURITY BEST PRACTICES – SIMPLE & WORTHWHILE CONCEPTS – PART II

Database security is a hot topic these days, especially with all the new and seemingly never-ending security compliance requirements being imposed such as GDPR. This means that organizations and their DBAs must step up their game when it comes to database security. Some DBAs may think these new requirements apply only to production but depending on the situation DBAs may well need to apply stricter security across the board – including development and all test databases (e.g. unit testing, stress…

Read More Read More

Start a Free Stealthbits Trial!

No risk. No obligation.