Call us at (888) 881-9000
Proton Data Security Blog
Some of the year’s best data-visualizations, interactives and scrollytellings have made the Information is Beautiful Awards 2018 Shortlist. Voting is now open to decide which works will win the Community Award at our ceremony in New York on Dec 4th. Plus your vote and all other visitor clicks represent five virtual people on our panel […]
Read More2018 Data Visualization Winners “Data visualization is a general term that describes any effort to help people understand the significance of data by placing it in a visual context. Patterns, trends and correlations that might go undetected in text-based data can be exposed and recognized easier with data visualization software.” Student = Shifting Gears: Visualizing Cycle […]
Read MoreThere were almost 1600 data breaches in the United States during 2017. Despite increased security measures, many businesses and organizations faced a situation where a data breach occurred. How you handle any data leak is important. Being prepared and taking immediate action can limit the damage caused by the incident as well as lower the […]
Read MoreDid you know that over 40 percent of companies suffer a data breach each year? There are many different ways in which data theft occurs. However, one area that companies often overlook is proper data disposal. Effective data security requires both digital and physical destruction of media. There are several data disposal systems on the […]
Read MoreRetailers store increasing amounts of classified data and must be prepared to safeguard it.
Read MoreWhile the IIoT and IoT are alike, businesses should anticipate key differences and be ready to properly sanitize data.
Read MoreData retention officers can police internal policy, determining which data should be kept and which should be destroyed.
Read MoreProper hard disk destruction and solid state drive shredding may not come across as a hot-button issue in the tech world, but the rise of edge computing could put a renewed focus on how companies safeguard physical data assets.
Read MoreWhile hybrid drives improve upon HDD and SSD limitations, they can present a problem for secure data destruction.
Read More