Employee Security Practices Information system (IS) security is challenging for organizations of all sizes. A study by Sadok, et al. took a closer look at the disconnect between corporate IS security policies and actual security practices in small-to-medium-sized enterprises (SMEs)1. Many organizations of this size are reliant on information technologies and networked systems to support their business operations […]
Category: Outsourced IT
Cybersecurity Incident Response Planning A cybersecurity incident response plan (or IR plan) is a set of instructions designed to help an organization prepare for, detect, respond to, and recover from network security incidents. Much like a disaster recovery plan designed for natural disasters, a cybersecurity incident response plan prepares your organization to respond to digital disasters. Significant incidents […]
Cloud-Based E-Health System Security Cloud-based healthcare computing has become much more common as its advantages, such as scalability, collaboration with Artificial Intelligence (AI), and machine learning, are undeniably attractive. While there are many benefits, there are many concerns and challenges as well. Cloud-computing challenges for applications in healthcare include different types of management, technology handling, security […]
Regaining Trust After a Data Breach Any business of any size can become a victim of a data breach. We tend to think of data breaches as cybersecurity threats for large organizations, but here are some facts to reveal the scope of the real cybersecurity threat landscape for data breaches: A Verizon Data Breach Investigation Report […]
Data Destruction and Bankruptcy A lot of interest and attention is focused on issues relating to the security and storage of data, but there is also a lot to understand and consider regarding the final phase of data life: destruction. Perhaps it is due to the optimism with which one builds a business, but it is not built often enough with its […]
Data Ethics
Data Ethics What is Data Ethics? Floridi & Taddeo1 define data ethics as, “…the branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including artificial intelligence, artificial agents, machine learning, and robots) and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order […]
OCR for ADA Compliance
Optical Character Recognition A common method for making PDF documents is to scan the paper copies with a scanner, and then viewing the new PDF document with application software such as Adobe Acrobat. This method is satisfactory if you will only ever want to view the document as an image, but with a different approach your […]
Cloud Archiving For a host of practical reasons, your organization must engage in some method of long-term records retention. It is likely that this is a topic that your organization has not spent much time thinking about or discussing, because a system that was in place earlier has been inherited and continues to be in use. If this system involves banker’s […]
Help Desk/Service Desk What is a help desk? It may seem like the obvious answer is that a help desk is there to resolve technical issues. Of course, this is true, but there is actually a broad scope of services that help desks can support beyond the obvious troubleshooting of crashes and blue screens of death. The primary objective […]
By the end of 2022, federal agencies must comply with a 2019 directive1 from the National Archives and Records Administration (NARA) and the Office of Management and Budget (OMB) to transition to electronic records. The directive states that the following must happen by December 31, 2022: Federal agencies will manage all permanent records in an electronic format […]