Data Security Blog
Pennsylvania Cybersecurity Firm Reclamere Marks 25 Years by Advancing Duty of Care Risk Standards
Tyrone, PA (March 2026) – Pennsylvania-based cybersecurity firm Reclamere is celebrating 25 years in business by leading a critical shift in how organizations across the Commonwealth and nationwide approach cyber risk and accountability. Founded in 2001 in Central Pennsylvania, Reclamere has grown alongside the rapidly evolving cybersecurity landscape. What began as a data destruction and…
Read More What Type of Data Is This? Teaching Employees to See PHI, PCI, and PII in Their Daily Work
Data classification is often treated as a technical or compliance exercise. Policies define categories such as Public, Internal, Confidential, and Restricted. Risk matrices are created. Systems are labeled. However, in practice, classification decisions are made by employees. When a staff member exports a spreadsheet, forwards an email, uploads a file to a collaboration platform, or…
Read More Employees, Devices, and BYOD: Why Your Policies Aren’t Matching Today’s Risk
The modern attack surface did not expand in a dramatic moment. It expanded gradually and almost invisibly. It expanded when remote work became normalized. It expanded when personal smartphones began accessing regulated systems. It expanded when convenience quietly outpaced governance. In many regulated SMB environments, device policies evolved on paper while risk evolved in practice.…
Read More You Can’t Secure What You Didn’t Inventory
Cybersecurity programs often focus on tools, alerts, and incident response. But one foundational challenge continues to undermine security efforts across organizations: Lack of asset visibility. In this episode of Data Security over Coffee, Reclamere’s Joe Harford and Angie Singer Keating sit down with Patrick Costello, Partner Account Manager at Cynomi, to discuss why asset inventory…
Read More The Hidden Costs of Shadow IT: How Unmanaged Assets Increase Cyber Risk
Shadow IT rarely begins with malicious intent. It usually starts with convenience. An employee shares documents through a personal cloud storage account. A department adopts a new SaaS tool without notifying IT. A team uses an unauthorized messaging platform to accelerate communication. These decisions are often made to improve productivity. However, they introduce unmanaged risk.…
Read More Free Insider Threats eBook!
Click to learn more about our partnership:
Click to verify our protection from data security breaches & fraud:
Click to view our security score on SecurityScorecard:
Click to view our SOC 2 Type 1 Certificate of Completion:
Click to learn more about our membership:
Get Updates
"*" indicates required fields