FireOak Strategies, LLC is pleased to be a Platinum Sponsor of this year’s KMWorld event. We’ll be at the conference in Washington, D.C. from November 6-8, and we’ll be presenting at the co-located Office 365 Symposium.
When implemented properly, multi-factor authentication dramatically strengthens security defenses, making it much more difficult for attackers to use stolen credentials.
Many models of HP networked printers include a flaw which allow an attacker to compromise a printer’s embedded network controller and install a persistent backdoor.
Data breaches can happen to any organization. Incorporate these components into your Information Security Incident Response Plan to be prepared for a potential data breach.
When most people think about data protection, their first thought — maybe even second, third and fourth thoughts — is about financial information, and that is an important place to start.
An organization we work with was recently the victim of a ransomware attack. Read the full story.
Do you know how your organization’s information security program stacks up? Where you’re the most vulnerable? Technology alone isn’t enough.
Good practices for sharing confidential information via email.
Within many organizations, most confidential data is stored in an Enterprise Resource Planning (ERP) system such as Salesforce, WorkDay, or SAP. Since these systems have solid technical and security controls built-in, executives often have a false sense of security, and they trust that their digital assets, confidential data, and intellectual property are all properly protected.
FireOak Strategies is a boutique consulting firm that helps organizations manage, secure, and share their knowledge. We bring clarity to complexity, look for elegant and simple solutions, and make sure that organizations are focused on solving the right problems. Learn more…
Manage, secure, and share your organizational knowledge
Browse articles by topic: