Blog

Blog

The History of Data Breaches

As the wave of data breaches continues to crash down on companies, let’s take a look back at some of the largest and most damaging data breaches on record. Read on for a historical walk through breaches over time as well as resources for preventing data breaches.
Blog

What is the California Consumer Privacy Act?

Learn about the California Consumer Privacy Act and its larger implications for the rest of the United States in Data Protection 101, our series on the fundamentals of information security.
Blog

California Passes Rigorous New Data Privacy Bill

California passed a sweeping data privacy bill on Thursday believed to be the strictest in the nation. The law will give consumers the ability to ask what data companies have on them and to sue over data breaches.
Blog

What Does an Insider Threat Analyst Do?

Learn about what an insider threat analyst does, along with how they affect existing procedures, policies, and protection layers in organizations in Data Protection 101, our series on the fundamentals of information security.
Blog

52 Percent of Organizations Ready for GDPR

According to a recent survey 40 percent of companies said they won't be compliant with the General Data Protection Regulation (GDPR) when it goes into effect next month.
Blog

The Early Indicators of an Insider Threat

Whether malicious or negligent, insider threats pose serious security problems for organizations. Forrester Senior Security Analyst Joseph Blankenship offers some insight into common early indicators of an insider threat.
Blog

Why Your Employees are a Bigger Threat than Hackers

Global cybercrime costs could reach $2 trillion by 2019. That’s up 3X from 2015, which was only a paltry $500 billion by comparison. Surprisingly, though, hackers should be the least of your worries.
Blog

How to Enable Two-Factor Authentication on Confidential Documents

This is the twelfth installment in our How-To series: an ongoing set of product posts full of tips and tricks for getting the most out of Digital Guardian Secure Collaboration. Public. Restricted. Top Secret. You know the drill. If you’re like most organizations, you have a similar schema to classify confidential data. But how do you add additional protections to your most sensitive content? And how do you make sure competitors can’t access your strategic plans if they do get their hands on them? We recently announced dynamic, two-factor authentication for highly sensitive data. With native two-factor authentication and out-of-the box integrations into RSA SecureID and Duo Security, we’re giving our customers the ability to add an on-demand, two-factor challenge for users accessing highly confidential secure content. The best part: it’s really simple. And it’s an incredibly powerful way to let your team know they’re working with confidential content and protect against compromised credentials. Here’s a quick breakdown of how to enable two-factor authentication on confidential documents with Digital Guardian Secure Collaboration: Build a “Top Secret” Security Policy with Two-Factor Authentication In the Admin portal, create a security policy to classify documents as Top Secret. This security policy will not only label your data as Top Secret, it will allow your team to secure and control how recipients work with classified content, wherever it travels. For highly confidential documents, we recommend a security policy that disables editing, saving and printing on your data. Quickly add two-factor authentication by selecting Require Authentication > Secondary when building the policy. You can choose either native Digital Guardian Secure Collaboration two-factor authentication via Twilio or plug-and-play integrations with RSA SecureID and Duo Security. It’s an effective way to help you consistently manage authentication across your business. Secure Data with your “Top Secret” Policy When you secure a document with our product, you’re ensuring your Top Secret security policy sticks to your data throughout its life cycle - even if it’s downloaded, duplicated or moved offline. To manually secure a document, right-click the file and select “Top Secret.” Alternatively, automatically secure and apply the Top Secret policy to any email leaving your organization, automatically secure files with sensitive keywords stored in local SMB drives, Box, Dropbox, or OneDrive/SharePoint. Challenge Recipients with a Two-Factor Authentication Token What happens when recipients get a Digital Guardian Secure Collaboration secured document? Recipients can easily access secured content without installing our software, proprietary software or clunky plug-ins. Our product will first validate their email address and then challenge them with a two-factor authentication challenge. See screenshot below for our native two-factor authentication via Twilio. And that’s it! You’ve now added additional checks and balances to prevent leaks and ensure your most confidential content is in the right hands - no matter where it travels after it leaves your network and moves to untrusted environments. We’re here to talk to you anytime and show you our Secure Collaboration functionality if you have any questions.