Knowledge Management and Information Security Resources

Research, white papers, case studies, articles, and other resources to help organizations make the most of their knowledge, information, and data.  

Balancing Security and Sharing

For most organizations, it can be a challenge to balance the need to protect and secure data with the need to promote internal knowledge sharing. But it doesn't have to be the case.

Multi-Factor Authentication

When implemented properly, multi-factor authentication dramatically strengthens security defenses, making it much more difficult for attackers to use stolen credentials.

Information Security Update: HP Network Printer Vulnerabilities

Information Security Update: New HP Network Printer Vulnerabilities June 17, 2017 Many models of HP networked printers include a flaw which allow an attacker to compromise a printer’s embedded network controller and install a persistent backdoor.  Once infected, such a device can be used to l

Developing a Knowledge Management Program

Designing, launching, and establishing a new knowledge management program takes careful planning and execution. Too often, we see organizations fail. Avoid common mistakes.

Levels of Knowledge Management

A look at four levels of knowledge management (KM): personal or individual; department, project or team; organization-wide; and inter-organizational.

Job Posting: Part-Time Salesforce Developer (Contractor – Telecommuting)

Job Posting: Salesforce Developer (Contractor, Part-Time) February 20, 2017 FireOak Strategies, LLC, a boutique consulting firm specializing in Knowledge Management, Information Management, and Information Security, is looking for a part-time Salesforce developer. This person will work closely wi

Want to Stay Informed? 

Sign up for the FireOak Strategies newsletter and have all new resources delivered directly to your inbox. 

Newsletter Signup