Blog

Data Access Governance Best Practices - Part 2 of 2

File Server Permissions

  • 7 July 2021
  • Number of views: 2283
Data Access Governance Best Practices - Part 2 of 2

As mentioned in Part 1, mounting a good defense requires understanding the offense and therefore requires getting control of your file permissions. This is a very important and often overlooked step.  It includes define, assign and organize both users and administrative level permissions as well system access level permissions. 

What is WCAG?

Web Content Accessibility Guidelines (WCAG)

  • 1 June 2021
  • Number of views: 2278
What is WCAG?

WHAT IS WCAG?

Web Content Accessibility Guidelines (WCAG) are internationally-adopted standards developed and published by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C), in collaboration with individuals, governments and organizations around the globe. The goal of these recommendations is providing a single shared standard to make internet content and digital assets more accessible, primarily for people with disabilities that impact their online experience. The basis of these guidelines are four principles which form the acronym “POUR:” Perceivable, Operable, Understandable, Robust.

QR Codes are Fun!

What type of QR Codes can I create?

  • 11 May 2021
  • Number of views: 2644
QR Codes are Fun!

There are so many ways you can successfully use QR Codes. You may choose from URL, vCard, Plain Text, Email, SMS, Twitter, WiFi, Van Wraps, and even Bitcoin. 

Data Access Governance Best Practices - Part 1 of 2

Data Access Management

  • 15 April 2021
  • Number of views: 1789
Data Access Governance Best Practices - Part 1 of 2

Mounting a good defense requires understanding the offense. When it comes to data access, file permissions and systems and network configurations, it consists of the following: 
 

  1.  Common Sense and Concern
  2.  Hard Work (just doing it)
  3.  Knowledge (basic and advanced)
  4.  Consistent Review

Regardless, everyone should be engaged and concerned, and it really does take everyone. Note: Most security problems and issues start with the network and inside the network with local network users (employees and management - in other words, you).  

The parts of a QR Code!

A.K.A the Anatomy of a QR Code...

  • 17 March 2021
  • Number of views: 3171
The parts of a QR Code!

It’s the 90s and you have just ejected your video cassette, leaving the square TV screen in a state of static white noise. Visually, that is what comes to mind when some people look at the QR Code. A complex matrix of black and white squares. Though looking like a pixelated image, each one of those squares is actually a marker serving a greater function in the information-sharing capabilities of the Code.

RSS
123456
«October 2024»
MonTueWedThuFriSatSun
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910