Categories
IT Security Outsourced IT

Employee Security Practices 

Employee Security Practices  Information system (IS) security is challenging for organizations of all sizes. A study by Sadok, et al. took a closer look at the disconnect between corporate IS security policies and actual security practices in small-to-medium-sized enterprises (SMEs)1. Many organizations of this size are reliant on information technologies and networked systems to support their business operations […]

Categories
IT Security Outsourced IT

Cybersecurity Incident Response Planning  

Cybersecurity Incident Response Planning   A cybersecurity incident response plan (or IR plan) is a set of instructions designed to help an organization prepare for, detect, respond to, and recover from network security incidents. Much like a disaster recovery plan designed for natural disasters, a cybersecurity incident response plan prepares your organization to respond to digital disasters. Significant incidents […]

Categories
Application Security IT Security Outsourced IT

Cloud-Based E-Health System Security 

Cloud-Based E-Health System Security  Cloud-based healthcare computing has become much more common as its advantages, such as scalability, collaboration with Artificial Intelligence (AI), and machine learning, are undeniably attractive. While there are many benefits, there are many concerns and challenges as well. Cloud-computing challenges for applications in healthcare include different types of management, technology handling, security […]

Categories
IT Security Outsourced IT

Regaining Trust After a Data Breach 

Regaining Trust After a Data Breach  Any business of any size can become a victim of a data breach. We tend to think of data breaches as cybersecurity threats for large organizations, but here are some facts to reveal the scope of the real cybersecurity threat landscape for data breaches:  A Verizon Data Breach Investigation Report […]

Categories
Backup & Disaster Recovery Outsourced IT

Data Destruction and Bankruptcy

Data Destruction and Bankruptcy  A lot of interest and attention is focused on issues relating to the security and storage of data, but there is also a lot to understand and consider regarding the final phase of data life: destruction. Perhaps it is due to the optimism with which one builds a business, but it is not built often enough with its […]

Categories
IT Security Outsourced IT

Data Ethics

Data Ethics  What is Data Ethics? Floridi & Taddeo1 define data ethics as, “…the branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including artificial intelligence, artificial agents, machine learning, and robots) and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order […]

Categories
Government Outsourced IT

OCR for ADA Compliance

Optical Character Recognition  A common method for making PDF documents is to scan the paper copies with a scanner, and then viewing the new PDF document with application software such as Adobe Acrobat. This method is satisfactory if you will only ever want to view the document as an image, but with a different approach your […]

Categories
Backup & Disaster Recovery Outsourced IT

What is Cloud Archiving?

Cloud Archiving  For a host of practical reasons, your organization must engage in some method of long-term records retention. It is likely that this is a topic that your organization has not spent much time thinking about or discussing, because a system that was in place earlier has been inherited and continues to be in use. If this system involves banker’s […]

Categories
Outsourced IT

The difference between Help Desk and Service Desk

Help Desk/Service Desk  What is a help desk? It may seem like the obvious answer is that a help desk is there to resolve technical issues. Of course, this is true, but there is actually a broad scope of services that help desks can support beyond the obvious troubleshooting of crashes and blue screens of death. The primary objective […]

Categories
Government Outsourced IT

Government Document Management

By the end of 2022, federal agencies must comply with a 2019 directive1 from the National Archives and Records Administration (NARA) and the Office of Management and Budget (OMB) to transition to electronic records.   The directive states that the following must happen by December 31, 2022:  Federal agencies will manage all permanent records in an electronic format […]