Content hub

data-compliance

Search
Colleagues discussing DSAR process
3 Min

Protecting Customer Data: Is Your DSAR Process Compliant?

Are your processes compliant when it comes to DSAR requests? Learn how to authenticate requests, securely transmit data, and...

Prof. Simon Pringle Sustainability Expert Podcast
4 Min

Reassessing The ESG Hierarchy With Simon Pringle (Podcast)

We chatted with Professor Simon Pringle about the future of ESG (environmental, social, and governance) for podcast episode 7.

Female professional using desktop computer to authenticate emails
8 Min

What Is Email Authentication?

Email authentication verifies the identity of an email sender or recipient. It checks that the...

Man working with confidential information on pc
4 Min

What Is Personally Identifiable Data? Risks and Vulnerabilities

Learn about the importance of Personally Identifiable Data (PII) and the risks associated with...

Male scratching his head after sending unencrypted email
6 Min

What Is Email Encryption? Explainer & Statistics

Email encryption is the encrypting or disguising of email content to protect it from being...

Colleagues smiling about secure email delivery
4 Min

Secure Email for SMEs: What You Need to Know

Email accounts for a rising portion of small business security incidents. Here,...

Man sending secure emails to his customers
2 Min

How to Send Secure Confidential Emails to Customers

While email use is substantial, it is not always the most secure method of...

Man preventing data loss using desktop computer
3 Min

What Is Data Loss Prevention? Starter Guide to Email DLP

Data loss prevention (DLP) is used to refer to a range of tools that help...