Illinois: (312) 533-4033                  Indiana: (765) 395-7240
Pennsylvania: (814) 333-3117         Wisconsin: (262) 686-5070


Tag Archive: data breaches

Difference Between Data Security and Data Integrity

Can you have data security without having data integrity? Can you have data integrity without having data security? Data integrity and data security are related terms, each playing an important role in the successful achievement of the other. Data security is the protection of data against unauthorized access or corruption and is necessary to ensure data integrity. Data integrity is a desired result of data security, but the term data…
Monday, May 28, 2018

Requirements to Achieve Data Integrity

Data integrity is the overall completeness, accuracy and consistency of data. Organizations need reliable data in order to make quick and effective decision making. Compromised data is of little use to enterprises, not to mention the dangers presented by sensitive data loss. For this reason, maintaining data integrity should be a core focus of all businesses. Data integrity can be compromised in…
Monday, May 21, 2018

Tips To Make Your IT Resilient

Almost all businesses critically rely on their IT systems to run their business. Without these systems up and running, businesses can lose thousands and thousands of dollar per day.  If these systems go down due to a natural disaster, temporary power outage, loss of data center, ransomware or hacker attack, lost or corrupted files, or an application failure due to a…
Monday, April 30, 2018

Spider Ransomware Gives Victims 4 Days

Just when you think you have seen it all, a new spider ransomware changes the game. Attackers behind a new ransomware campaign are offering an easy tutorial video to ensure they make money from their criminal activities. This spider ransomware is being distributed through malicious Office documents, infecting victims with file-encrypting malware. This strand of ransomware was only detected a…
Wednesday, December 13, 2017

GDPR Compliance

GDPR (General Data Protection Regulation) is a regulation that requires businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. GDPR Compliance will make organizations around the world that collect data from any EU citizen to comply with strict new rules around protecting customer data within the next year….
Tuesday, November 14, 2017

Outsourcing Regulatory Compliance

Data security and breach notification issues continue to grab headlines, most recently about the data breach announced by Equifax. Regulatory scrutiny is currently underway, with the Federal Trade Commission (FTC) surprisingly publicly announcing that the agency is investigating the breach. Not that long ago, UBER was investigated by the FTC for a security breach that occurred with their storing of…
Friday, November 3, 2017

Microsoft Azure Introduces Confidential Computing

Microsoft Azure Blog Series One of the top concerns organizations have when considering implementing cloud technologies is security. Just last week, Microsoft announced Azure is the first cloud to offer new data security capabilities with a collection of features and services called Azure confidential computing. Confidential computing offers a protection new to public clouds, encryption of data while in use. This means…
Tuesday, September 19, 2017

Cyber Security Threat Warnings for 2017

As we saw in 2016, cyber threats are going to continue to be prevalent in 2017. Hackers and Security Vendors will continue to try to outsmart each, which will in turn take the level of sophistication of attacks to an entirely new and scary level.  Now that you are warned of the impending dangers looming in 2017, the next step…
Thursday, December 15, 2016