Wednesday, August 12, 2020
Home Tags Security

Tag: Security

COVID-19 opens ‘Pandora’s box’ of Florida businesses’ privacy concerns via CSR...

Dr. Ross Federgreen, CEO of CSR, discusses privacy concerns during the COVID-19 pandemic here.

7 Considerations for a Smooth Video Conference

by Andrew Ysasi, MS June 24, 2020 Many of us have transitioned to working from home...

Remote Working and Mobile Device Security and Privacy Resources via Privacy...

Policies and Procedures, Tools and Tips, can all be found here regarding Work From Home (WFH).

State of Cybersecurity 2020, Part 2 Report Available and Free to...

Check out the report here...login required.

2020 Cybersecurity Threat Trends Outlook via Booz | Allen | Hamilton

Check out their report that includes "Nine ways threat actors will make waves in 2020" here.

Recorded Webinar Available Cybersecurity in an Uncertain World: New Ways to...

Thank you for recently attending the Government Technology Webinar entitled "Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats".

MER 2020 Conference sees spike in registration once virtual option is...

Less than a week to go and #MERv registrations are pouring in. We have UNLIMITED "SEATING" so join us!

Book Review: The Executive’s Guide to Navigating the Information Universe

In the latest book from well known RIM and IG writer, speaker, and author, Randolph Kahn, he hits home what executives need...

The Master CompTIA Training Bundle – Lifetime Access only $49.99

Become a Certified CompTIA Professional & Solve Basic to Expert-Level IT Issues with 200+ Hours of Video-Led Training

Book Review: Records and Information Management 2nd Edition

April 22, 2020 Dr. Pat Franks is a well-known teacher and author throughout the Record and Information Management (RIM)...

Top 10 Bulk Email Verification and Validation Services Compared via Accu...

This insightful post shows the technical, security, and privacy features with some popular bulk email software.

Designing a doctoral program in cyber security for working professionals from...

A great research paper on the subject via this PDF.

A Massive U.S. Property and Demographic Database – Hosted on Google...

Read more about this story here.

Configuration mistakes blamed for bulk of stolen records last year: IBM...

Misconfigured servers accounted for 86% of the record 8.5 billion records compromised in 2019 according to the article.

Top Posts on IG GURU in 2019

Security, blockchain, legacy media (tape), leadership, frameworks, and misuse of information continue to be popular topics on IG GURU. Below are...

CISA Cyber Essentials: The Leaders Guide

The week of infographics and guides! Check out the NIST CISA Cyber Essentials guide here.

New HIPAA Security Risk Assessment Tool incorporates NIST framework

Version 3.1 of the HHS Security Risk Assessment (SRA) Tool features new functionality

Throwback article is a good reminder on how mobile devices are...

The Many Identifiers in Our Pockets

Inmates built computers hidden in ceiling, connected them to prison network...

An amazing story out of Ohio showing how inmates were able to build computers and connect to the prison network.

Work Ruined Email by the Atlantic

It’s not too late to fix it.

FaceApp responds to privacy concerns via TechCrunch

A few weeks ago FaceApp spread like wildfire. Soon after news came out that FaceApp is based in Russia. FaceApp...

What Is the Difference Between IT Security and Cybersecurity?

Monday, June 17, 2019 by James Stanger Some people seem to use the terms IT security, information security and cybersecurity...