Data Security ( Page 2 )

  • Home
  • Posts Tagged "Data Security"
  •  ( Page 2 )

Trends in Privacy and Data Security Breaches

As large-scale security breaches at major companies captured headlines in 2014, lawmakers in the US and abroad remain active on both the regulatory and enforcement fronts.Large-scale security breaches involving national retailers commanded the headlines and spurred private litigation over when an individual has standing to bring a lawsuit following a data breach. Privacy and data ...
Read more

Best Practices for Mobile Device Data Security

In 2014, it became official: There now are more active mobile devices in the world than people, according to data compiled by GSMA Intelligence and the U.S. Census Bureau. The rise in mobile devices is not confined to personal use; mobile devices increasingly play an integral role in many business operations. We rely on mobile ...
Read more

A Guide to Electronically Stored Information Preservation Responsibilities

Co-authored by Thomas W. Tobin The litigation-related duty to preserve relevant evidence, including electronically stored information (ESI), is well established and widely known in the legal community and the business world. Despite broad familiarity with this obligation, many corporate litigants have recently been subjected to severe sanctions due to an increasing judicial intolerance for the ...
Read more

An Introduction to Data-Driven Decisions for Managers Who Don’t Like Math

Not a week goes by without us publishing something here at HBR about the value of data in business. Big data, small data, internal, external, experimental, observational — everywhere we look, information is being captured, quantified, and used to make business decisions. Not everyone needs to become a quant. But it is worth brushing up ...
Read more

Don’t Forget Copiers, Scanners and Fax Machines in Your Data Security Program

Current generation multifunction printer/scanner/copier devices are convenient, inexpensive, and very popular. Often overlooked is the fact that most modern printers, copiers, and scanners have many of the same attributes of computers, and are just as vulnerable to the same kind of cyber exploits and attacks as computers. A truly comprehensive data security and privacy risk ...
Read more

Yikes! Ransomware Could Take Over Your Hard Drive

Once data is held for ransom, there’s no guaranteed way to reclaim it — not even payment. Ransomware’s victims typically are those with the least protection. To avoid becoming a target, install strong security tools on your computer and mobile devices, back up data to a reliable cloud service, keep passwords in a secure location, ...
Read more