You are here
Home > Author: admin (Page 45)

Privacy and data protection governance in five steps

Data is the lifeblood of any business. However as the volumes explode, it becomes a herculean task to protect sensitive data and prevent privacy infringements. Companies must understand the laws, regulations and standards for privacy and data protection, as well as ensure compliance with those rules. But where do you go

Your Data: Managing Gigabytes, Terabytes and Beyond

When talking computer disk space most people are familiar with the term gigabyte (GB). Disks are usually sold with some multiple of gigabytes available. However, terabytes of data are becoming more common particularly when formed by RAID or the joining of disks to create arrays. But what comes next? Well, there is

Safeguards against Data Security Breaches (Part One)

With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to hacking, malware and other potential risks. Concerns about security, trust and PII, personally-identifiable information, are all taking center stage

How green is the cloud?

Blogs

Most people assume the cloud is more energy efficient than conventional processing. But there is no evidence for this. Check out the guest post by Graeme Philipson. More>>

Common Misconceptions about Data Security

Blogs

Many organizations will be under the impression that a data breach is something that happens to others.  When a breach actually takes place, they think it is like lightening, and only strikes once. Organizations should never underestimate the threat, or the importance of strong data security practices. Data breaches don’t always

Top