Articles

Tag: grc (page 8)

  • Reviewing the State of GRC

    If there is any value to the concept of Governance, Risk management and Compliance, it must lie in more than the generic meanings of its constituent parts. A good place to start is the treatment of the term by the Open Compliance & Ethics Group (OCEG ).

    Continue reading...


  • 15 Years of E-Signatures: Time to Toss Your Pen?

    15 Years of E-Signatures: Time to Toss Your Pen?

    Get out the birthday candles. June 30 is National E-Sign Day and the 15th birthday of the US National E-Sign Act, which declared paper signatures and electronic signatures equal under federal law. The act didn't set the world on fire.

    Continue reading...


  • 6 Ways to Cope With a Scary Social World

    6 Ways to Cope With a Scary Social World

    On a daily basis, 30,000 websites are hacked, 75 million scams are sent via email and 41,000 identities are stolen.  Since its infancy, the web has been a gold mine for scammers who have continued to adapt to the ever-evolving landscape.

    Continue reading...


  • Metadata Is a Love Note to the Future

    Metadata Is a Love Note to the Future

    We are living in a data-driven society, with globalized economies and ubiquitous access to everything from everywhere. Across information gateways such as websites, file shares, instant messaging and collaboration systems both in the cloud and on premises, data is free-flowing within and outside an organization’s walls.

    Continue reading...


  • Assessing the Risks of Cyber Attacks

    Assessing the Risks of Cyber Attacks

    Cyber hackers cracked the US federal government earlier this month, exposing personnel information  for about 4 million current and former federal employees. Cyber attackers targeted the Office of Personnel Management (OPM) and may have originated in China.

    Continue reading...


  • You Can Bring Down a Website for $38

    You Can Bring Down a Website for $38

    Could you pass up a $40,000 return on a $20 investment? Odds are you couldn't if you enjoy wreaking havoc on a business. New research released today by Incapsula shows distributed denial of service (DDoS) assaults continue to be expensive nuisances for online businesses — and that the attacks can

    Continue reading...


  • Why Information Governance Matters for Data Protection

    Why Information Governance Matters for Data Protection

    Any outage or lost document in a business critical application is going to be costly. The average cost of datacenter downtime is around $300,000 per hour, so having at least a modest data protection plan in place moves from a nice-to-have to a must-have.

    Continue reading...


  • Without Information Governance, Your Tech Doesn't Matter

    Without Information Governance, Your Tech Doesn't Matter

    The past six months I have talked to a wide variety of organizations, helping them assess their content management efforts, and in the process gaining a better understanding of how the average organization addresses its content challenges.

    Continue reading...


  • Choosing the Best Public Cloud Provider

    Choosing the Best Public Cloud Provider

    Here's your challenge: Pick the best public cloud provider from the leaders of the pack. Your options: Amazon (AWS), Azure, Google (GCP), IBM Cloud and Rackspace. Confused? You're not alone.

    Continue reading...


  • 10 Ways to Secure Office 365

    10 Ways to Secure Office 365

    Security. If there's one thing that concerns organizations contemplating a move of their data to the cloud, or that are already there, it's security. With new threats being introduced on a regular basis, organizations need to use all the tools they have at their disposal to secure their data.

    Continue reading...


  • Are Careless Employees Threatening Your IT Security?

    Maybe we've been making a mistake all these years, plowing the majority of our IT security resources into new security approaches and technologies. More and more studies are showing that human error is behind a significant number of security breaches.

    Continue reading...


  • What's New with Office 365 Compliance Center

    What's New with Office 365 Compliance Center

    Litigation is costly, time consuming and a headache -- and chances are your company is involved in it in some way. Compliance is the topic that causes many IT leaders to lose sleep, as they wonder whether they will survive a call from legal. Microsoft is listening.

    Continue reading...


  • Why Do Large Enterprises Have Security Breaches?

    Why Do Large Enterprises Have Security Breaches?

    Large enterprises. Mid-sized businesses. Mom and pops.  Seems like they're all vulnerable to data security breaches today, right? It's no longer as easy as locking up the front door of the business. Just ask Slack, Target and even Salesforce, each of which dealt with cyber attacks on some

    Continue reading...


  • Is the Apple Watch a Security Threat?

    Is the Apple Watch a Security Threat?

    The Apple Watch. We know it's pretty and new and sexy and fun to use. We know it will be a great complement to other mobile devices.

    Continue reading...


Displaying 99-112 of 479

NL-01a
Get the CMSWire Newsletter
  • Receive concise summaries of what's happening in your industry
  • Get access to exclusive reports, white papers and webinars

lock We take your privacy seriously

NL-03a
Get the CMSWire Newsletter

You'll receive:

  • Exclusive Articles
  • Latest White Papers
  • Early Event Invites

Join 55,000 subscribers and growing

We take your privacy seriously

Get the CMSWire Newsletter

Join 55,000 subscribers and growing

We take your privacy seriously

You'll receive

  • Exclusive Articles
  • Latest White Papers
  • Webinar Invites
NL-03a
Join 55,000
of your peers

Get the CMSWire newsletter.
Access exclusive news, best practices and events.