Search

1 to 9 of 9
Sort by

Blog Entry
Risk Analysis and Legacy Data: How to make your Big Data Defensible

Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probability that the loss will occur.” Based on this definitions, there are even mathematical models to calculate the actual probabilities, magnitude and loss of calamities and disastrous events

Johannes Scholtes's profile image

Blog Entry
Information Security Checklist: Best Practices for SharePoint

Everywhere you turn today you hear about various instances of data loss and data breaches, all of which lead to a general sense of data insecurity. These issues range from loss to theft, or even taking of personal information or corporate trade secrets

Matthew Bretzius's profile image


Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

The first priorities should be to assess the scope of the breach, to immediately stop any ongoing data loss, and to preserve evidence and documentation about the breach. Internal IT personnel should be mobilized to determine the cause of the breach and to take quick steps to halt further damage or loss of information

Megan Mohrmann's profile image

Blog Entry
Ensuring Compliance: Information Types Your Organization Should Be Concerned About

Doing so will not only mitigate the risk of regulatory and statutory penalties and consequences, but will also go far in preventing an unnecessary erosion of employee or consumer confidence in the organization as the result of a breach or the loss of sensitive data

Matthew Bretzius's profile image


Blog Entry
What are the implications of the provisions of the new EU General Data Protection Regulation (GDPR) on U.S. Businesses?

The definition of “data breach” is defined broadly to include “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed

Andrew Pery's profile image

Blog Entry
Dark Data – Rediscovering This ‘Hidden’ Business Intelligence Treasure in Your Document Capture Process

While most companies recognize the presence and importance of this illusive, yet valuable, dark data, particularly when it comes to handwritten fields, many are still not leveraging it, and instead information is either being ignored, or manually entered, leading to errors or loss

Don Dew's profile image