filemonitor

How to detect data breaches

Most people do not know where all their important files are, and this makes detecting data breaches tad difficult. To…

August 21, 2023

GDPR significantly broadens the scope of data privacy requirements: are you in, or out?

The European Data Privacy Directive (Directive 95/46/EC of the European Parliament), is still the data privacy law in effect today…

August 21, 2023

Tesco Bank: Money stolen from customers’ accounts – thousands affected

Last weekend brought unpleasant surprises for the customers of Tesco Bank, the banking system of a major retailer in the…

August 21, 2023

How to monitor Skype file sharing from corporate endpoints

Skype is a popular communication platform, so companies who are concerned with data security, compliance and assessing the risk of…

August 21, 2023

Five ways in which TEMASOFT FileMonitor can help healthcare organizations

Monitoring and analyzing how files are being accessed, how they change, and how they move around the IT environment brings…

August 21, 2023

How to Monitor Google Drive Uploads from Corporate Endpoints

Insider theft and misuse are a major area of concern when it comes to protecting information and complying with security…

August 21, 2023

European data privacy regulation – what makes “personal data”?

Background In Europe, the first data privacy considerations were brought to the European Council's attention in 1980 as "The Organization…

August 21, 2023

TEMASOFT proudly sponsors the “2016 Insider Threat Spotlight Report.”

The Insider Threat Spotlight report is based on a survey of more than 500 security professionals at various career levels,…

August 21, 2023