Archive for the ‘Security’ Category
While it is easy to say and conclude that all data belongs to your organization, complications arise when the person accountable for data ownership has to be identified. Even when the IT department spearheads the process of processing, storing, and…
The Health Insurance Portability & Accountability Act (HIPAA) sets standards for protecting sensitive data of patients in the cloud. Any company which is dealing with PHI (protected health information) needs to ensure all of the required network, physical, and process…
In this article, let us explore a bit about origin of HIPAA privacy & security rules and its major parts such as – who are covered, what information is protected, and what safeguards need to be in place to…
FTP vs Cloud Storage: Main Differences Between FTP Server & Cloud Storage From the early days of FTP (File Transfer Protocol) to the rise of cloud-based storage solutions, each method comes with its own strengths and limitations. This guide compares…
Single Sign On or SSO is the solution that gives one-click access to all of the applications with one password. According to Wikipedia, SSO is a property of access control of multiple related, but independent software systems. With this property…
Security tips for lawyers need not be a list of complex technical IT setup. Simple set of actions could prevent some major breaches. With their professional ethics requiring high confidentiality and information security for their clients, lawyers definitely need a secure,…
Microsoft officially stopped supporting Windows Server 2003 (the announcement had been made well in time) starting Jul 2015. If you, as an organization, are still using Windows Server 2003, without the knowledge of the serious risks of doing so, it’s probably…
Since the advent of computers, users have progressively invented file sharing systems to conveniently and efficaciously pass information to each other. First came floppy disks, which were subsequently replaced by web based platforms. Initially, emails were the predominant web based file sharing…
Local area network administrators, network admins, or system administrators, are the individuals within a company that oversee the performance of the organization’s networks. These professionals are expected to gather and assess information from network users so that they might identify…
Every year a distinguished panel comprising of CEOs, CIOs, CSOs, VCs, analysts, and CSO Outlook magazine’s editorial board selects the list of top cloud security solutions and services providers. The companies are selected based on the vendor’s capability to fulfill…