Sensitive Data

Trust but Verify. Implementing your data access infrastructure

5 minute read Published: 2021-10-07

Welcome to the third part of our article series on data access. In the first two we focused on why sometimes these data access initiatives can fail and what you can do about it , as well as how to set up your system to handle employee access to sensitive data

Trust But Verify. What to do about sensitive data.

6 minute read Published: 2021-09-30

This is the second article in our series on data access best practices. In the first one we looked at the reasons why data access can be challenging for organizations and highlighted some of the key principles that are good to have in mind when setting up this process. In this one we will show you how to protect your sensitive data.