Blog

Data Access Governance Best Practices - Part 2 of 2

File Server Permissions

  • 7 July 2021
  • Number of views: 1078
Data Access Governance Best Practices - Part 2 of 2

As mentioned in Part 1, mounting a good defense requires understanding the offense and therefore requires getting control of your file permissions. This is a very important and often overlooked step.  It includes define, assign and organize both users and administrative level permissions as well system access level permissions. 

Free Webinar - Microsoft Graph and Delve

Get to Know Office 365, part 1 of 6

  • 7/23/2021 11:00 AM
  • Number of views: 2720
Free Webinar - Microsoft Graph and Delve

What you can do with them and why they matter?

Come join us to discover the features and functionality of Microsoft Graph and Delve. Learn how you can leverage Microsoft Office 365 to build applications and workflows that help you "do more with less", securely and optimally, especially if you have Office 365 already deployed and being used.

 

What is WCAG?

Web Content Accessibility Guidelines (WCAG)

  • 1 June 2021
  • Number of views: 996
What is WCAG?

WHAT IS WCAG?

Web Content Accessibility Guidelines (WCAG) are internationally-adopted standards developed and published by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C), in collaboration with individuals, governments and organizations around the globe. The goal of these recommendations is providing a single shared standard to make internet content and digital assets more accessible, primarily for people with disabilities that impact their online experience. The basis of these guidelines are four principles which form the acronym “POUR:” Perceivable, Operable, Understandable, Robust.

QR Codes are Fun!

What type of QR Codes can I create?

  • 11 May 2021
  • Number of views: 1291
QR Codes are Fun!

There are so many ways you can successfully use QR Codes. You may choose from URL, vCard, Plain Text, Email, SMS, Twitter, WiFi, Van Wraps, and even Bitcoin. 

Data Access Governance Best Practices - Part 1 of 2

Data Access Management

  • 15 April 2021
  • Number of views: 729
Data Access Governance Best Practices - Part 1 of 2

Mounting a good defense requires understanding the offense. When it comes to data access, file permissions and systems and network configurations, it consists of the following: 
 

  1.  Common Sense and Concern
  2.  Hard Work (just doing it)
  3.  Knowledge (basic and advanced)
  4.  Consistent Review

Regardless, everyone should be engaged and concerned, and it really does take everyone. Note: Most security problems and issues start with the network and inside the network with local network users (employees and management - in other words, you).  

RSS
First567810121314Last
«September 2023»
MonTueWedThuFriSatSun
28293031123
45678910
11121314151617
18192021222324
2526272829301
2345678