Articles in: Privacy

Enterprise cloud security

Best Practices for Increasing Enterprise Cloud Security

Steps to improving enterprise cloud security

Information is one of the most powerful instruments one can wield, and organizations have a vested interest in protecting their corporate memory from malign actors. Accordingly, cyber threats are something that 47% […]

Holistic Records Management System

The Surprising Benefits of Being Organized

Using a Holistic Records Management System Approach

A Holistic Records Management System You may already be aware of how proper data governance can drastically cut down on the time and money spent performing regular data cleanup projects, but there […]

teams-archiving

Study: Top Drivers for Implementing Microsoft Teams Governance

Exploring the importance of incorporating Microsoft Teams in data Governance strategies

ZL Tech recently partnered with Osterman Research to investigate how enterprises are archiving and protecting Microsoft Teams data. Surveying medium- and large-scale organizations that have adopted Microsoft Teams, 143 IT leaders were […]

file-management-webinar

What is File Management?

A basic preview of what file management is and how to implement it

Files are one of the most often neglected data source in enterprise storage. They are riddled with ROT and home to personally identifying information that pose compliance, privacy, security, and overhead risks […]

spring file cleaning

Spring Cleaning and File Cleanup

With the arrival of Spring, make sure to clean up your files and your home

Spring has officially sprung! For many, this season ushers in a host of rituals embracing the longer days and warmer weather. As I type, people across the country are putting on long […]

hipaa email archiving

HIPAA Privacy and Compliance Rules: Email Archiving Requirements

Answering the whos, whats, and hows of HIPPA email archiving requirements

While there are many components of HIPPA compliance, this post will only detail the requirements under the Privacy and Security Rules. For more information on all HIPAA requirements, refer to their website. […]