Categories
IT Security Outsourced IT

Regaining Trust After a Data Breach 

Regaining Trust After a Data Breach  Any business of any size can become a victim of a data breach. We tend to think of data breaches as cybersecurity threats for large organizations, but here are some facts to reveal the scope of the real cybersecurity threat landscape for data breaches:  A Verizon Data Breach Investigation Report […]

Categories
Backup & Disaster Recovery Outsourced IT

Data Destruction and Bankruptcy

Data Destruction and Bankruptcy  A lot of interest and attention is focused on issues relating to the security and storage of data, but there is also a lot to understand and consider regarding the final phase of data life: destruction. Perhaps it is due to the optimism with which one builds a business, but it is not built often enough with its […]

Categories
IT Security

Cyber Threat Intelligence

Cyber Threat Intelligence  Cyber threat intelligence (CTI) aims to develop timely, relevant, and actionable intelligence about emerging threats and key threat actors to enable effective cybersecurity decisions.1 CTI is a data-driven four-phase process. CTI professionals can be expected to proceed through the following general CTI lifecycle:  Phase 1: Intelligence planning/strategy. Organizations will first define their intelligence needs by […]

Categories
Websites

WordPress for Enterprise

WordPress for Enterprise   WordPress is the most well-known and most popular Content Management System (CMS) available. WordPress is a state-of-the-art semantic personal publishing platform that focuses on aesthetics, web standards, and usability, and WordPress powers more than 37%1 of the top 10k websites in the United States. It’s a powerhouse. While WordPress touts itself as a “personal publishing platform”, this CMS has […]

Categories
IT Security Outsourced IT

Data Ethics

Data Ethics  What is Data Ethics? Floridi & Taddeo1 define data ethics as, “…the branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including artificial intelligence, artificial agents, machine learning, and robots) and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order […]

Categories
IT Security

Endpoint Defense

Endpoint Defense  IT endpoints are the devices that people use to access company resources. Examples of endpoints are personal computers, mobile devices, point-of-sale terminals, and other various devices where data is created, processed, and stored, such as IoT devices. The explosive growth of endpoints has been coupled with the explosive growth of cyber threats on endpoints, making endpoint […]

Categories
Government Outsourced IT

OCR for ADA Compliance

Optical Character Recognition  A common method for making PDF documents is to scan the paper copies with a scanner, and then viewing the new PDF document with application software such as Adobe Acrobat. This method is satisfactory if you will only ever want to view the document as an image, but with a different approach your […]

Categories
IT Security

Ransomware in School Districts

Ransomware in School Districts  Ransomware attacks in educational organizations and school districts are on the rise, with at least 830 individual schools having experienced incidents between January and July 2021.1 The beginning of the school year is a prime time for ransomware attackers targeting schools, with several ransomware incidents occurring in recent years that delayed the first […]

Categories
IT Security

Password Management: Protect your data

What is Password Management? Passwords are strings of characters used to verify the identity of a user in an authentication process. While passwords remain as one of the most secure methods of authentication available, they continue to remain vulnerable to security threats. Account management, authentication, and password management are essential activities to protect data security, but […]

Categories
Backup & Disaster Recovery Outsourced IT

What is Cloud Archiving?

Cloud Archiving  For a host of practical reasons, your organization must engage in some method of long-term records retention. It is likely that this is a topic that your organization has not spent much time thinking about or discussing, because a system that was in place earlier has been inherited and continues to be in use. If this system involves banker’s […]