News & Insights by Atakama


Multifactor Encryption: The Last Mile after Data Classification

Data proliferation is a persistent issue for IT and Security leaders. Further fueled by the shift to remote and hybrid work, the incredible volume of data is scattered across various locations, from

Read More

Disrupting the Basics: 5 Best Practices for Safeguarding Sensitive Data

There is no better time than during cybersecurity awareness month to examine the basic principles of a layered data protection strategy and assess its effectiveness in protecting sensitive data.  

Read More
Guide , Zero Trust

Zero Trust Checklist: Multifactor Encryption is at the Heart of Zero Trust Security

There is almost zero chance that you haven’t heard the term “Zero Trust” recently. The term, coined in 2010 by John Kindervag, one of the world's foremost cybersecurity experts, recognizes that trust

Read More

It’s Cybersecurity Awareness Month! Best Practices for Protecting Sensitive Data from Exfiltration

Fall is our favorite time of year. While some celebrate the season by enjoying the foliage and pumpkin patches, we pay tribute to data security education and recognize October as  Cybersecurity

Read More

Are you Ransomware Ready? How to Win the War with Multifactor Encryption

NATO Investigates Attack on Global Missile Defense Firm Critical data was stolen recently from a top European missile systems firm, MBDA. Nato is investigating the leak, which includes classified

Read More
How To

How To Search Through Encrypted Documents

Compliance directives coupled with sophisticated cyber threats have led businesses to adopt a myriad of tactics to meet regulatory requirements and mitigate data security risks. As security

Read More

Mitigate Email-based Security Risks With Encrypted File Transfer

You’ve probably heard a statistic or two about how employee mistakes drive the majority of data loss at organizations. It might come as a surprise, though, that email is the riskiest channel for data

Read More
Security , Encryption

Securing Unstructured Data: A Best Practice Guide to Balance Data Protection and Accessibility

An important component of the current data-driven landscape that businesses operate in is the sheer diversity of sources and formats contributing to the ever-increasing volume and wide distribution

Read More
Encryption , Regulatory Compliance

NACHA Security Rules: A Race Against the Clock to Meet Data Security Requirements

In 2021 The Automated Clearing House Network (ACH) experienced significant growth, processing an unprecedented 5.3 billion B2B payments reflecting a  20.4% increase in volume compared to the prior

Read More

Multifactor Encryption Explained

Cryptography and encryption have been trusted for secure communication for thousands of years. Dating back to its use in ancient Egyptian, Greek, and Roman culture to preserve religious knowledge,

Read More
Encryption , Cloud Security

Cloud Encryption: Who is Responsible for The Keys?

Cloud adoption continues to rise as enterprises move more of their workloads and data to cloud infrastructure. When it comes to protecting the sensitive crown jewel data stored by organizations in

Read More
Regulatory Compliance , Privacy

What the CPRA Means for Your Organization

With the passing of California’s Proposition 24 in late 2020, the state updated its groundbreaking California Consumer Privacy Act (CCPA), providing additional clarification around terms and

Read More