WHITE PAPER: Implementing Office 365: Inherent Features and the Need for...
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will...
View ArticleInformation Governance and the Internet of Things
Machines talking to machines. Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very...
View ArticleHow to Survive Data Discovery in the Digital Age
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because...
View ArticleBreach of Security: Measuring the Cost of Cyber Crime
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as...
View ArticleFOIA reforms are on the way, are you ready?
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President...
View ArticleTargeting Risks in IT – 5 Things to Consider
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a...
View ArticleUnderstanding the General Data Protection Regulation
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding...
View ArticleBring Your Own Device & Data Security
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes....
View ArticleFinding PCI and PII Data with Discovery Attender
Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit...
View ArticleWays to avoid Information Governance pitfalls
Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is. There are many components to IG, with the two...
View Article