Web Analytics

Category: Information Security

  • Team Collaboration Platforms Lessons Learned

    Over the past few years, we’ve seen tons of collaboration and knowledge sharing platforms become popular including Slack, Facebook for Work, and Microsoft Teams. On top of those platforms, popular project management tools such as Trello, Asana, and Basecamp also include capabilities designed to increase collaboration and knowledge sharing as part of their feature set.

    Read more


  • What We’re Reading – January 28, 2019

    We keep an eye out and share the most interesting articles, reports, and case studies FireOak topics: managing, sharing, and securing information, data, and knowledge.

    Read more


  • Forward Momentum in U.S. Open Government Data

    Right before the end of the year, on December 21, 2018 the U.S. Congress passed The Open, Public, Electronic, and Necessary Government Act (also known as the OPEN Government Data Act), an act designed to break down information silos in the federal government, transforming inaccessible documents into open and usable data.

    Read more


  • Six Months with the GDPR

    Europe’s General Data Protection Regulation (GDPR) just passed its six month milestone. Not surprisingly, most organizations aren’t yet in compliance, but one key takeaway is that good-faith efforts towards compliance are worth investing in.

    Read more


  • Big Data in Agriculture: Research Data Loss Horror Stories

    We’ll be presenting at the CGIAR Big Data in Agriculture Convention on October 2, 2018. Abby Clobridge and Eric Smith will be sharing three research data loss horror stories from an information security perspective — situations that led to entirely preventable data loss.

    Read more


  • KMWorld 2018

    FireOak Strategies, LLC is pleased to be a Platinum Sponsor of this year’s KMWorld event. We’ll be at the conference in Washington, D.C. from November 6-8, and we’ll be presenting at the co-located Office 365 Symposium. 

    Read more


  • Multi-Factor Authentication

    When implemented properly, multi-factor authentication dramatically strengthens security defenses, making it much more difficult for attackers to use stolen credentials.

    Read more


  • Information Security Update: HP Network Printer Vulnerabilities

    Many models of HP networked printers include a flaw which allow an attacker to compromise a printer’s embedded network controller and install a persistent backdoor.

    Read more


  • Data Loss Prevention Best Practices

    FireOak’s recommended practices for data loss prevention.

    Read more


  • How to Mitigate a PR Nightmare if You Experience a Data Breach

    Data breaches can happen to any organization. Incorporate these components into your Information Security Incident Response Plan to be prepared for a potential data breach.

    Read more