Blog

Data Access Governance Best Practices - Part 2 of 2

File Server Permissions

  • 7 July 2021
  • Number of views: 2123
Data Access Governance Best Practices - Part 2 of 2

As mentioned in Part 1, mounting a good defense requires understanding the offense and therefore requires getting control of your file permissions. This is a very important and often overlooked step.  It includes define, assign and organize both users and administrative level permissions as well system access level permissions. 

Free Webinar - Microsoft Graph and Delve

Get to Know Office 365, part 1 of 6

  • 7/23/2021 11:00 AM
  • Number of views: 4027
Free Webinar - Microsoft Graph and Delve

What you can do with them and why they matter?

Come join us to discover the features and functionality of Microsoft Graph and Delve. Learn how you can leverage Microsoft Office 365 to build applications and workflows that help you "do more with less", securely and optimally, especially if you have Office 365 already deployed and being used.

 

What is WCAG?

Web Content Accessibility Guidelines (WCAG)

  • 1 June 2021
  • Number of views: 2137
What is WCAG?

WHAT IS WCAG?

Web Content Accessibility Guidelines (WCAG) are internationally-adopted standards developed and published by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C), in collaboration with individuals, governments and organizations around the globe. The goal of these recommendations is providing a single shared standard to make internet content and digital assets more accessible, primarily for people with disabilities that impact their online experience. The basis of these guidelines are four principles which form the acronym “POUR:” Perceivable, Operable, Understandable, Robust.

QR Codes are Fun!

What type of QR Codes can I create?

  • 11 May 2021
  • Number of views: 2441
QR Codes are Fun!

There are so many ways you can successfully use QR Codes. You may choose from URL, vCard, Plain Text, Email, SMS, Twitter, WiFi, Van Wraps, and even Bitcoin. 

Data Access Governance Best Practices - Part 1 of 2

Data Access Management

  • 15 April 2021
  • Number of views: 1660
Data Access Governance Best Practices - Part 1 of 2

Mounting a good defense requires understanding the offense. When it comes to data access, file permissions and systems and network configurations, it consists of the following: 
 

  1.  Common Sense and Concern
  2.  Hard Work (just doing it)
  3.  Knowledge (basic and advanced)
  4.  Consistent Review

Regardless, everyone should be engaged and concerned, and it really does take everyone. Note: Most security problems and issues start with the network and inside the network with local network users (employees and management - in other words, you).  

RSS
123468910Last
«September 2024»
MonTueWedThuFriSatSun
2627282930311
2345678
9101112131415
16171819202122
23242526272829
30123456