The First Step to Data Security is a Strong Password
Where there is yin, there is yang. Where there is bad, there is good. And where there is data, there are cyber-criminals. In the endless battle to protect our assets, secrets, and identity, the passwords we choose and use are our first line of defense. So a strong password is better than a weak one.… Read More
3 Best Ways to Prevent Unauthorized Data Access
Monday, November 14, 2016
It’s paramount to prevent unauthorized data access on both personal and business systems. The information stored on these systems are often for only a select few to view and use. Exposing financial information, proprietary secrets, personnel data, etc. can be a costly mistake. Unauthorized users aren’t necessarily hackers (although that’s possible). They’re often a family member, friend, or employee… Read More
Protect Your Mobile Devices from Data Theft
Mobile devices (smartphones, tablets, laptops, etc.) are more than a means of communicating, working, and playing. They themselves hold sizable stores of information, but also serve as gatekeepers to more lucrative data, such as financial, medical, and other personal information. Their portability and diminutive size makes them more susceptible to loss and/or theft than a desktop.… Read More
Data Breaches: Responsibility and Liability
Two well-known companies became the victim of data breaches in 2014: Home Depot and Target. As a result, email addresses and credit card information was stolen from millions of customers. These customers must now spend years watching their credit reports and bank accounts for false information and charges- all from information that took seconds to… Read More
Email Privacy Violations: What to Do About It
The 4th amendment to the United States Constitution exists to protect your right to privacy. It mandates that your property can only be examined by those who have first procured a warrant to do so. Yet government agencies extort our data from technology and telephony giants without warrants to meet their insatiable desire for power over… Read More
Defining Sensitive Information
Monday, September 12, 2016
Sensitive Information Sensitive information is information meant to be protected against unwarranted disclosure. It is vital this information be kept secure, since a number of laws and compliance standards mandate such protection. These laws were enacted to protect personal privacy and proprietary information. Sensitive Information includes all data, in any form, which contains: Customer record information Card… Read More
Data, Data Protection, Data Security, doctors, education, FERPA, fraud victims, government documents, healthcare, HIPAA, Identity theft, Information Technology, law, lawyers, legal, missing files, PCI, personal information, Protection, school, Security, sensitive information, social security, wrokplace
How Publishing Relates To Information Technology
What does book publishing have to do with information technology? Well… have you ever picked up a book that you just can’t put down? You turned the first page at 7 PM and it’s only when you begin yawning that you notice the time- 3 AM?! How did that happen?! It didn’t happen by accident.… Read More
10 Ways to Protect Your Data
Is your business’ data adequately protected from internal and external threats? Data security breaches in recent years have compromised the personal information of millions of people and caused extensive damage to the companies responsible for securing that data. Any business of any size can be at risk for financial loss and untold damages to their… Read More
Five Simple Ways to Protect Your Data
When it comes to safeguarding your data, it is common to overlook things that go beyond encrypting your computer data or password protecting it. Yet, it doesn’t take much to protect yourself from scammers or hackers, and it doesn’t cost anything.… Read More