Regaining Trust After a Data Breach Any business of any size can become a victim of a data breach. We tend to think of data breaches as cybersecurity threats for large organizations, but here are some facts to reveal the scope of the real cybersecurity threat landscape for data breaches: A Verizon Data Breach Investigation Report […]
Author: Nikki Pham
Data Destruction and Bankruptcy A lot of interest and attention is focused on issues relating to the security and storage of data, but there is also a lot to understand and consider regarding the final phase of data life: destruction. Perhaps it is due to the optimism with which one builds a business, but it is not built often enough with its […]
Cyber Threat Intelligence
Cyber Threat Intelligence Cyber threat intelligence (CTI) aims to develop timely, relevant, and actionable intelligence about emerging threats and key threat actors to enable effective cybersecurity decisions.1 CTI is a data-driven four-phase process. CTI professionals can be expected to proceed through the following general CTI lifecycle: Phase 1: Intelligence planning/strategy. Organizations will first define their intelligence needs by […]
WordPress for Enterprise
WordPress for Enterprise WordPress is the most well-known and most popular Content Management System (CMS) available. WordPress is a state-of-the-art semantic personal publishing platform that focuses on aesthetics, web standards, and usability, and WordPress powers more than 37%1 of the top 10k websites in the United States. It’s a powerhouse. While WordPress touts itself as a “personal publishing platform”, this CMS has […]
Data Ethics
Data Ethics What is Data Ethics? Floridi & Taddeo1 define data ethics as, “…the branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including artificial intelligence, artificial agents, machine learning, and robots) and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order […]
Endpoint Defense
Endpoint Defense IT endpoints are the devices that people use to access company resources. Examples of endpoints are personal computers, mobile devices, point-of-sale terminals, and other various devices where data is created, processed, and stored, such as IoT devices. The explosive growth of endpoints has been coupled with the explosive growth of cyber threats on endpoints, making endpoint […]
OCR for ADA Compliance
Optical Character Recognition A common method for making PDF documents is to scan the paper copies with a scanner, and then viewing the new PDF document with application software such as Adobe Acrobat. This method is satisfactory if you will only ever want to view the document as an image, but with a different approach your […]
Ransomware in School Districts
Ransomware in School Districts Ransomware attacks in educational organizations and school districts are on the rise, with at least 830 individual schools having experienced incidents between January and July 2021.1 The beginning of the school year is a prime time for ransomware attackers targeting schools, with several ransomware incidents occurring in recent years that delayed the first […]
What is Password Management? Passwords are strings of characters used to verify the identity of a user in an authentication process. While passwords remain as one of the most secure methods of authentication available, they continue to remain vulnerable to security threats. Account management, authentication, and password management are essential activities to protect data security, but […]
Cloud Archiving For a host of practical reasons, your organization must engage in some method of long-term records retention. It is likely that this is a topic that your organization has not spent much time thinking about or discussing, because a system that was in place earlier has been inherited and continues to be in use. If this system involves banker’s […]