Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Details

Startup Business Cloud Use Issues

Startup business cloud service is becoming a key aspect in the data management requirements of many entities.  Startup business cloud service could save considerable amount of money for a startup.  Cloud service of data process becomes, for many, their central component for their data. The decision to use a cloud service, however, should consider the…

Details

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Details

Startup Technical Issues

Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow.  The technical aspects of a business surpass the threshold requirements of having a computer and a phone.  Considering…

Details

Business Records Handling

Business records are created every minute in business and in a variety of entities.  Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record.  Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…

Details

Data Breach Injury In fact

Data breaches catch all by surprise.  The data breach itself stifles the entity that had the breach.  But to anyone outside that wonders if they have been affected, their opportunity to claim is not that easy to depict.  Standing is an issue that has to be overcome.   The compromise of personal identifiable information (PII) has…

Details

Social Media Privacy Trust

Social media privacy trust is easily and all too often not evaluated by users.  Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends.  However, it has become blatantly clear that by using the platform to share with friends,…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details

Cloud Technology Knowing All

Cloud technology may have the capability of detecting access, use, and process.  More can be known than originally expected.  The capability of this technological use is referred to as being able to see from above.  One such company that utilizes this type of technology is Uber. Uber’s cloud technology use for a ‘God view’ was…

Details

IoT Security

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Details

Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Details