Protect Your Workforce, Company, and Data During the Pandemic
The concept of “telecommuting” is nothing new, and as advancements in technology and Internet bandwidth have grown over the years, the remote workforce has grown tremendously yet..
Challenging Convention: Ediscovery Software Shouldn't Be Used for Data Breach Response
Data privacy regulations are growing in number and complexity, but one thing remains the same through this evolution: the time constraints are severe. That’s just one of the many..
3 Clear Predictions for Data Privacy Technology in 2020
Data privacy regulations are an important rebound to our increasingly digital and connected world, but they are moving targets fraught with complexities and challenging time..
How to Make Your Incident Response Plan
At Legalweek New York 2019, Canopy attended the Beyond The Attack – Legal & Ethical Considerations In Breach Response session. The panel educated us about the interplay between..
4 Ways to Reduce Abnormal Churn After a Data Breach
Abnormal churn, defined as the loss of customers due to a data breach, is on the rise in the United States. According to the 2018 Cost of Data Breach Study by IBM and the Ponemon..