Virtru Blog

Now Available: Outlook PDF Watermark

As part of Virtru’s mission to make data privacy and control easier than ever, we’re excited to announce our PDF Watermark capability is now available for use in Outlook for Windows. Virtru Pro’s PDF Watermark feature now enables Outlook senders to individually watermark any encrypted PDF attachment that they share with their recipient’s email address – […]

January 4, 2017 | Business, Security
Google Recommends Virtru for G Suite Encryption

We are pleased to announce that after completing rigorous testing and security audits, Google has selected Virtru as its recommended application for G Suite encryption. Virtru adds client-side file and email encryption, control, and data loss prevention (DLP) directly into G Suite. Secure your emails and files no matter where they travel, and comply with […]

December 19, 2016 | Google Apps Security, Security
Business Privacy Policy: Protecting Your Customers & Your Business

For many companies, business data protection seems simultaneously like an obligation and an impossibility. On the one hand, businesses need to protect users’ data. On the other hand they have to be able to communicate with users and partners all over the globe. Pre-Internet, upholding a strong business privacy policy wasn’t hard. You could store […]

December 12, 2016 | Business, Security
Next Level Data Loss Prevention Tools: Beyond the Perimeter

The goal of traditional data loss prevention tools (DLP) is to stop confidential data from leaving the organization. If an insider accidentally (or intentionally) bypasses DLP protection, however, there’s not much they can do. Once the data is out there, it can be shared, copied or published, and there’s very little you can do about […]

December 8, 2016 | Business, Security
Data Loss Protection: Safeguarding Trade Secrets

Corporations invest huge amounts of money and effort into safeguarding trade secrets and other pieces of intellectual property. They screen and interview potential employees carefully, draw up strict NDAs to protect data and create elaborate and arcane rules to control access. But often, they neglect the most important control — their data loss protection program. […]

December 2, 2016 | Business, Security
Why Business Data Privacy is Good for Your Bottom Line

Customers are increasingly concerned with business data privacy, and react strongly to news of data breaches. A recent study showed that 75% of adults are worried about privacy or security issues. Even more concerning, 71% of those studied said they would think twice about shopping at a retail store that whose customer information was attacked […]

November 15, 2016 | Business, Security
4 DLP Security Best Practices for Email

Data Loss Prevention (DLP) is one of the most effective tools to reduce the risk of inadvertent breaches. Properly implemented, it can catch costly mistakes before they harm your organization, and even help employees learn your security policies. However, DLP is not a one-size-fits-all solution — it needs to be properly configured for your organization. […]

November 3, 2016 | Business, Security
Corporate Data Security — Evaluating the Risks to Secure Business Data

Part 2: Cyber Security Awareness Month Series Your biggest data security risk isn’t hostile outsiders — it’s negligent insiders. Most insider threats in cyber security come from a lack of clear policies and consistent training. In Part 1 of our Cyber Security Awareness Series, we discussed the damage breaches can do to your company and your […]

October 14, 2016 | Business, Security
Webinar: Must-Know Insights for Government Email Security and Compliance

CJIS and HIPAA compliance. Data breaches. Privacy concerns. For most city, county, and state officials, these concerns sit at the top of their priority lists. How can health and social workers safely store and share protected health information (PHI) and remain HIPAA compliant? How can law enforcement officers share CJIS data compliantly? How can system […]

October 10, 2016 | Email Encryption, Security
Insider Threat Detection in Government Cyber Security

Insider threats are one of the biggest data security challenges faced by government agencies. The sheer complexity of government IT infrastructure and the value of the information governments process make it easy for a clumsy (or malicious) insider to compromise security (and increase the damage that insider can do). Insider threat detection in government cyber […]

August 26, 2016 | Security