Knowledge base

Terms, definitions, information. Start here if you want to learn more about Safetica solutions.


Go to Knowledge base

e-Learning

Do you want to learn in a systematic manner? Just choose your course and start exploring the word of of Safetica and insider threat protection.

Go to e-Learning

Webinars and events

From online webinars to meetups and technology fairs... here is a list of all Safetica events.

Go to webinars and events

Topics: Data security

Download our E-book: Data and Home Office

Hybrid working arrangements means more data challenges. Download our e-book Protect Your Company Data in the Remote Work Era (10 Tips for IT Managers).

Download the Radicati Group Report: DLP Market Quadrant

Download the full report today, find out why Safetica is a proven leader and how its DLP solutions will help you prevent data loss and future-proof your business.

Using Messenger for company communication is a big risk

Read an interview with Zbyněk Sopuch, CTO of Safetica, about the risks of messaging platforms for businesses.

"Sometimes it is as much psychology as IT"

Zbyněk Sopuch, CTO of Safetica, explains how the DLP software is developed and what are the most important issues DLP needs to solve.

Broad home office exposes your company data

On average, one in ten companies in the Czech Republic has experienced sensitive data leaks. Learn how to prevent them during the epidemic.  

CCPA – the new data protection rules for California

Companies have only 3 months to adapt to the new rules for data protection brought by CCPA (The California Consumer Privacy Act).

What did 2018 bring and what security challenges will we face in the coming year?

We may no longer be afraid of GDPR, but data leaks are still scary. What important lessons did we learn in 2018? What are our predictions for online security for 2019?

Data Loss Prevention 2017 and 2018 in numbers

The year 2017 has seen countless attacks on sensitive data, a huge buzz around GDPR, as well as new threats.

State of cyber security in 2017 and what to expect in 2018

The year 2017 has seen countless attacks on sensitive data, a huge buzz around GDPR, as well as new threats. Let’s look back at what the year brought us in security and get a glimpse at what 2018 has in store for us.

Ransomware spreads across Europe. You never know when it can attack. How to defend?

Once a ransomware is inside the system it is very difficult to get it out. And expensive. But actually it is quite easy (and not that expensive) to protect the company data from such attacks.

38 questions and answers about GDPR

What does GDPR mean for my company? Who is the processor and the administrator? What about video records? We are answering your most pressing concerns about GDPR regulation...

The risk of external devices

USB flash drives, external drives, cameras or mobile phones make it easy and comfortable to transfer important data. On the other hand, they also bring a couple of security problems that we shouldn’t overlook.

How to protect IT against user mistakes

Ransomware, phishing, or data theft... a big part of present-day attacks relies on an ordinary user to open, intentionally or unintentionally, a door into the system for the attacker.

GDPR - the new data protection rules for EU

Companies have only 15 months to adapt to the new rules for data protection brought by GDPR (General Data Protection Regulation). What does it mean for your company and how can Safetica help?

What IT security brings in 2017?

Whether it's a new legislation such as GDPR (General Data Protection Regulation) or new trends concerning use of new technologies in companies, 2017 brings many changes and new risks that organizations should prepare for.

How to secure printed data

When we do security audits in smaller companies, we most commonly find paper CVs laying all around work desks and tables. They also commonly contain manager notes and comments. In larger companies we see financial documents, contracts and customer data.

How we messed with boot-time drivers

One of our customers recently reported a problem with running our software in tandem with VMware vShield. Although the solution turned out to be quite simple, the investigation process revealed some interesting facts related to driver behavior at boot time.

6 key changes the new EU's General Data Protection Regulation brings

Although the Data Protection Regulation is not entering into force until 2018, taking steps to get your company protected against data leaks seems like a smart thing to do immediately.

How to write a highly scalable Windows Socket server (BBQ library is the answer)

Our developer Benny (Marek Strihavka) has put together a sample code showing you how to write a highly scalable Windows Socket server in C++.

Thin line between transparency and security

When a company starts to think about information security and protecting their sensitive data, there is very often a fear that new controls and technologies will have a negative impact on company culture.

Data security meets California Dreaming and Bohemian Rhapsody

Let's take a look at the new Czech cyber security legislation and how si California trying to be at the front of data protection. And also take some time to listen to relevant musical pieces.

Are psychologists better than geeks in stopping insider threats?

Behavioral psychologists could do better than IT professionals in stopping insider threats, said two IT security experts at a conference in JP Morgan’s London offices.

Central European investment to protect against data breaches

Analyst firm Gartner, in its current report on IT security in Central and Eastern Europe, predicts the accelerated implementation of systems to protect against data breaches.

Data leaks put Prague and Goldman Sachs on common ground

The ongoing case of Prague Integrated Transport with the computer firms of Xanthus and Aremic brings to mind the sordid example of Goldman Sachs, Sergey Aleynikov – and the Princess Bride.

Data protection, drunk driving, and the Florida Information Protection Act

The new Florida Information Protection Act (FIPA) passed this summer has a lot of commonality with efforts to reduce drunk driving -- even if the law does not elevate beverage consumption to the "special kind of personal data" level.

Verizon Data Breach Report: Finding methods to the security madness

The long-awaited Verizon 2014 Data Breach Investigations Report is out and it’s well worth reading.

Coders vs. actuaries in data protection showdown

Would you rather trust a coder or an actuary for your data security?  Getting an answer to this question has companies reaching for one of two very different approaches to data security: direct technology or risk hedging.

Data Loss Hero and Industry Buzzwords

The most influential person of the year is clearly Edward Snowden who set off a domestic and international avalanche as the public and governments reacted to knowledge about the US National Security Agency’s surveillance activities.

Would installing DLP/monitoring software have pushed the NSA out of its comfort zone?

The U.S. National Security Agency did not install the most up-to-date data protection systems at its Hawaii site before contractor Edward Snowden went to work and removed thousands of classified documents.

Hazards to setting up semi-free Wi-Fi in the workplace

Semi-free Wi-Fi is where a company gives almost free Wi-Fi access to its employees – along with a few monitoring safeguards over what employees can download, access, and upload with their smartphones.

Grinders won't delete your lost data

Under pressure from officials from Her Majesty’s government, the editors of the Guardian newspaper in the UK destroyed the hardrives and computer equipment that had been used in reporting on Edward Snowden and the wiretapping by the American National Security Agency.

Cyber-criminals take a closer look at small businesses

Small businesses reported faster growth in the rate of cyber attacks than their large, more visible competitors according to an Information Security Breaches survey by the UK's Department for Business, Innovation & Skills.

Social media in the office: Abstinence and “Be Nice” warnings are no cure

It's all about removing the uncertainty over social media use at the workplace. Social media isn't something to fight over. Feel free to use it, but just within the limits.

Pub(l)ic versus private data in the hospital

Huntington Memorial Hospital in California was fined $25,000 after an admissions clerk took a patient's mobile phone number and sent her a sex-based text message.

Striking a balance: Employees in social media and corporate cyber security

Our CTO Pavel Krátký discusses trust, Facebook, privacy, hacker breaches, and employee access to monitoring reports in Sri Lanka's business paper Daily FT.

Your data and the law

It's not enough to have a program that keeps your data from leaving the company. Sometimes you need to take hard evidence of employee misdeeds to court.

Edward Snowden: Where's the data?

It is not what Edward Snowden has said that has the United States government and its National Security Agency so nervous, it is what he has showed – or could still show – to other outside parties.

General disaster: What could have prevented Paula

Paula Broadwell, the paramour and biographer of CIA director David Petraeus, was found with large amounts of classified government documents. Could a military-grade Data Loss Prevention (DLP) solution have stopped this data breach from happening?

Data leaks in October: From foreign affairs to the IT department

There were over a half million instances of data loss during October, with much of the data leaking from traditional pillars of reliability such as governments, transit authorities, and banks.
Safetica uses small cookies to improve your website experience. You may disable them from your browser settings at any time. Learn more.