Our most recent blog explored the risks of PST files and puts the question to IT departments, whether they have full control over their companies’ data set and if they are actively dealing with their PST dilemma. What can be done to limit the risks and exposure of PST files to your business? Below highlights the steps to take to understand the data you hold and the actions needed to secure it.