May 16, 2020 | Business, Computing, Cybersecurity, Data Assets, Data Centers, Internet, Radio Show, Radio_Show, Security, Technology, Technology
Cybersecurity Focus moves from Data Center to Clouds and Endpoints with the advent of Corporate telecommuting. One thing this pandemic has unveiled is that cybersecurity does begin and end in the data center. Technology has enabled the spread of multiple devices, both...
Mar 7, 2020 | Asset Management, Attack Vectors, Audit Logs, Best Practices, Business, Compliance, Critical data, cyberattacks, Data, Data Assets, data sharing, Data Storage, Databases, Disaster Recovery, Hard Disks, Intricate Data Systems, Policies and Procedures, Privacy, Radio Show, Radio_Show, records, Security, Security, Technology, Unsecured
Don’t Store Data You Don’t Need Today all businesses are tech businesses. That requires that they all comply with different variations of regulatory compliance, the requirements which are often changing faster than possible implementation. Unfortunately, due to these...
Feb 1, 2020 | Applications, Audit Logs, Business, Compliance, Cybersecurity, Data Assets, Databases, Fines and Penalties, Government, Hacking, Incident Response, industrial espionage, Legislation, Patching, Privacy, Radio Show, Radio_Show, Regulatory Compliance, Regulatory Compliance, Regulatory Frameworks, Security, Security Alerts, Security Assessments, Technology, Updates
Regulatory Compliance: The Perception and The Reality Regulatory compliance. We have all heard the term and for many business owners, the way to handle it is to stick their head in the sand and stay out of the spotlight. Why? It is complicated and expensive and they...