WindTalker Blog

Keeping Control of Data When an Employee Quits

Posted by WindTalker, Inc.

In “When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data,” Michael Ciaramitaro and Sarah Brown, both of Inventus, point out the number one vulnerability for most companies: “Organizations today rely heavily upon technology and electronically stored information – and when employees leave, there’s always a risk that they’ll take some information or data with them when they go, either inadvertently or on purpose.”

Read More

Topics: risk management, Differential Sharing, information security, unstructured data

Legal’s Apprehension of the Cloud Computing Has Solutions

Posted by WindTalker, Inc.

In her 6/26/19 article for Legal Tech News, “Can Cloud Providers Calm Legal’s Apprehensions,” Victoria Hudgins, observes: “As cloud computing becomes more popular, some law firms and corporate legal departments aren’t jumping fully on the bandwagon.”

Read More

Topics: LegalTechnology, databreach, sensitive data, Differential Sharing, Data Security, cloud computing, unstructured data

The WindTalker Blog

A Perspective on Cybersecurity Developments

Join us as we explore newsworthy developments in Cybersecurity. The WindTalker Blog is dedicated to sharing and informing the latest developments and providing a resource for subscribers in your journey to become more informed and protect your sensitive information.


Covering:
• Differential Sharing
• Avoiding Data Breaches
• Information Security

Subscribe Here!

Recent Posts