Spreadsheets are flexible, inexpensive and easy to use. They are especially handy when it comes to beating report submission deadlines or making impromptu data computations. Unfortunately, organisations heavy reliance on spreadsheets have made these User Developed Applications (UDA) into high-risk office tools. Simple spreadsheet errors like leaving out a negative sign or a cut-and-paste mistake […]
We came across a post on Docurated that pulled together thirty-seven suggestions for the top cloud storage mistakes user companies make. Given that cloud storage seems to be the best backup solution for now at least, we decided to turn these ideas around to sense the direction cloud backup and recovery needs to take, if […]
When DuPont lost $400 million in intellectual property, it wasn’t because a hacker from the other side of the world infiltrated their system. The information was simply stolen by a former employee. Alarmingly, data loss incidents are not always caused by deliberate actions. A file containing personal information accidentally attached to an email and sent […]
Most of the regulatory compliance issues we talked about concerning spreadsheets have been related to financial data. But there are other kinds of data that are stored in spreadsheets which may also cause regulatory problems in the future. In the US, a legislation known as HIPAA or Health Insurance Portability and Accountability Act is changing […]
Sometimes, all it takes is keeping the cyber crooks out.
Today’s malware are designed to generate revenues for their creators. That’s a very compelling driving force for would-be cyber crooks, don’t you think? So how can you still sleep well at night?
External and internal threats to sensitive data can be mitigated by using effective authentication and access controls
iPhones, BlackBerries, Androids. Extensive use of mobile devices in business-related activities may introduce additional vulnerabilities to your system.
So you had a customer data security breach last weekend? Do you know you could be held liable in court for failing to implement required security procedures?
Even in an economic downturn, threats to IT security can still be on a rise.