Is your staff ready to work from home en masse? Consult the FireOak Strategies Coronavirus Cybersecurity Checklist to prepare your organization.
What’s the state of email security for the 2020 presidential candidates? And what about the security of candidates’ websites? Read more for our analysis!
4 ways in which the deleted Epstein surveillance video highlights gaps in an organization’s cybersecurity program, and what you can do to prevent such nightmares at your organization.
The FireOak team keeps an eye out for and shares the most interesting audio based resources, like podcasts, related to managing, sharing, and securing information, data, and knowledge.
Over the past few years, responsible data has become a hot topic within the world of international development and humanitarian aid. As funding agencies push for open data and data-driven decision making, and digital technologies continue to evolve, development workers, researchers, and other individuals involved in supporting aspects of the data lifecycle are becoming increasingly concerned with what it means to responsibly collect, manage, transmit, and share data in responsible ways.
We are heavy users of Amazon Web Services (AWS) Elastic Cloud Computing (EC2) and regularly help clients transition their on-premises systems to the cloud.
In this post, I’ll demonstrate a technique using standard Linux tools to create a bootable AWS EC2 instance from an imported AWS volume image.
FireOak Strategies is a boutique consulting firm that helps organizations manage, secure, and share their knowledge. We bring clarity to complexity, look for elegant and simple solutions, and make sure that organizations are focused on solving the right problems. Learn more…
Manage, secure, and share your organizational knowledge
Browse articles by topic: