Blog


24 Sep
The two fundamentals of a successful access control system
Category: Advisory, Blog, Data access
The list of criteria can easily grow when looking for the right access control approach for your business. At Torsion we recommend keeping two overarching criteria firmly at the to...
09 Sep
Types of Data Access Control
Category: Advisory, Blog, Data access, File Sh...
Generally speaking, the different types of access control can be distinguished by how access is granted (DAC and MAC) and why access is granted (RBAC and ABAC). Here, we guide you ...
17 Aug
5 tips for choosing the right file-sharing solution
Category: Advisory, Blog, Data access, File Sh...
1. Make data sharing a business function Let’s face it, a lot of file sharing happens at work both internally and externally. And the volume of information being shared is in...
29 Jul
Latest research shows Data Access under greatest pressures
Category: Blog, Data access, Data Governance, ...
07 Jul
Trust your people to control access
Category: Advisory, Blog, Data access, File Sh...
Forbes has published some latest research that identified five key trends that set data-leading organisations apart from peers. One of those key trends is ‘Trust’, in p...
01 Jul
Collaboration Security: What is it and why does it matter
Category: Blog, Data access, Data Governance, ...
Collaboration Security is the practice of ensuring data shared through collaboration platforms is secure. The rise of collaboration platforms such as Teams, Sharepoint and File Sha...
09 Jun
Protect yourself against growing number of ransom hacks
Category: Blog, Insider Threat
Last month a Russian-based cyber-crime group, hacked the IT systems of Colonial Pipeline, cutting off nearly half of the US east coast’s fuel supply. The company paid a ransom in b...
02 Jun
Our top 5 scenarios for revoking data access
Category: Advisory, Blog, Data access, File Sh...
In our last blog we talked about the importance of revoking data access, to limit the amount of data sprawl that can easily get out of control. Here we give our top 5 scenarios in ...
27 May
Are you regularly revoking data access?
Category: Blog, File Sharing
Data sprawl refers to the staggering amount of data produced every day; estimated to be 40% year on year. Given that security weak spots will grow inline with data sprawl, organisa...
20 May
The added benefits of Data Access Governance
Category: Advisory, Blog, Data Governance
Data Access Governance puts you in control of, and proving, that you know who has access to what information, why and when. It’s vital for any organisation that has employees...