Knowledge Management and Information Security Resources
Research, white papers, case studies, articles, and other resources to help organizations make the most of their knowledge, information, and data.
For most organizations, it can be a challenge to balance the need to protect and secure data with the need to promote internal knowledge sharing. But it doesn't have to be the case.
When implemented properly, multi-factor authentication dramatically strengthens security defenses, making it much more difficult for attackers to use stolen credentials.
Information Security Update: New HP Network Printer Vulnerabilities June 17, 2017 Many models of HP networked printers include a flaw which allow an attacker to compromise a printer’s embedded network controller and install a persistent backdoor. Once infected, such a device can be used to l
FireOak's recommended practices for data loss prevention.
Designing, launching, and establishing a new knowledge management program takes careful planning and execution. Too often, we see organizations fail. Avoid common mistakes.
FireOak Strategies, LLC, a boutique consulting firm specializing in knowledge management, information management, and information security, is proud to announce national certification as a Women's Business Enterprise.
A look at four levels of knowledge management (KM): personal or individual; department, project or team; organization-wide; and inter-organizational.
Data breaches can happen to any organization. Incorporate these components into your Information Security Incident Response Plan to be prepared for a potential data breach.
Job Posting: Salesforce Developer (Contractor, Part-Time) February 20, 2017 FireOak Strategies, LLC, a boutique consulting firm specializing in Knowledge Management, Information Management, and Information Security, is looking for a part-time Salesforce developer. This person will work closely wi