Tag: data breach
![](https://www.zlti.com/wp-content/uploads/2020/09/shutterstock_1513496450.png)
Compliance
GDPR Recap: 28 Nations, 348 Fines, Half a Billion Euros
![Insider Threats; Cybersecurity](https://www.zlti.com/wp-content/uploads/2019/12/shutterstock_503235391.jpg)
Security
Insider Threats Don’t Have to Be Malicious or Even Intentional
![hack](https://www.zlti.com/wp-content/uploads/2019/10/shutterstock_1339612250.jpg)
Security
Hack Attack! Hacks Can Happen Anywhere
![](https://www.zlti.com/wp-content/uploads/2019/09/shutterstock_1086090845.jpg)
Business
Data Security: It’s Easier to Fall for a Scam Than You Think
![](https://www.zlti.com/wp-content/uploads/2019/09/Data-Breach-Health-docs.jpg)
Business
Data Breach: Tons of Health Data Has Been Exposed Because We Never Learn
![Fueling the Privacy Debate](https://www.zlti.com/wp-content/uploads/2017/10/Fueling-the-privacy-debate.jpg)
Compliance
Regulations: Fueling the Privacy Debate
![Managing risk by steering clear of disorganized file shares](https://www.zlti.com/wp-content/uploads/2017/06/Your-File-Share-is-not-a-Dumping-Ground.jpg)
Information Governance
Your File Share is not a Dumping Ground
![Why companies aren’t properly motivated to protect data](https://www.zlti.com/wp-content/uploads/2017/01/The-Deal-with-Data-Breaches.jpg)
Information Governance
The Deal with Data Breaches
![In today’s day and age, data security isn’t just about protecting access but keeping it from getting out](https://www.zlti.com/wp-content/uploads/2016/08/Data-Security-Enemy-Behind-the-Gates.jpg)
Information Governance
Data Security and the ‘Enemy Behind the Gates’ Scenario
![How strategic file analysis can increase file security](https://www.zlti.com/wp-content/uploads/2016/05/File-Shares-and-File-Fumbles.jpg)
Information Governance