How Healthy is Your Cybersecurity Program?
Do you know how your organization’s information security program stacks up? Where you’re the most vulnerable? Technology alone isn’t enough.
Do you know how your organization’s information security program stacks up? Where you’re the most vulnerable? Technology alone isn’t enough.
Good practices for sharing confidential information via email.
Within many organizations, most confidential data is stored in an Enterprise Resource Planning (ERP) system such as Salesforce, WorkDay, or SAP. Since these systems have solid technical and security controls built-in, executives often have a false sense of security, and they trust that their digital assets, confidential data, and intellectual property are all properly protected.
On March 24, 2016 printers at several colleges and universities around the world were used to print racist and anti-Semitic messages. The FireOak team suggests several ways to prevent such incidents from happening at your organization.
Part 3 of our series about data classification policies.
Part 2 in our series about data classification policies.
Part 1 of our series on data classification policies.
Information Today has published a new article by Abby Clobridge about Let’s Encrypt, an important milestone in internet encryption.