dcsimg

What is ROT (Redundant, Obsolete, and Trivial) Data and How to Manage It

When an organization is dealing with a large number of redundant, obsolete and trivial (ROT) data, the productivity and general output of that organization suffers a blow. The impact of ROT data can be easily addresses if the proper planning and solutions are put in place. What is ROT Data? ROT refers to data that is Redundant, Obsolete or Trivial. In other words, it is data that is either no … [Read more...]

The Hafnium Breach – Microsoft Exchange Server Attack

On-premise versions of Microsoft Exchange Server (one of the most popular enterprise-grade mail servers on the market) are under attack by what is believed to be a state-sponsored Chinese hacking group known as Hafnium. Who Was Affected? Thus far, it is estimated that as many as 60,000 organizations world-wide have been compromised by the zero-day exploit, according to an article published by … [Read more...]

What is CMMC Compliance? Introduction and Checklist

On the 1st of October, 2025, the Cybersecurity Maturity Model Certification (CMMC) will come into effect. CMMC is a cybersecurity framework that is being developed by The United States Department of Defense (DoD). What is CMMC Compliance? The purpose of CMMC is to standardize cybersecurity practices across the federal government’s defense industrial base (DIB), and to ensure that organizations who … [Read more...]

How Excellus Could Have Avoided the $5.1m HIPAA Violation Penalty

In January 2021, an American Health insurer by the name of Excellus agreed to pay over $5.1 million to the Office for Civil Rights (OCR) at the US Department of Health and Human Services (HHS) in a settlement after violating the Health Insurance Portability and Accountability Act (HIPAA). Excellus Data Breach The violation in question relates to a data breach that resulted in the sensitive data of … [Read more...]

Top 20 Data Breaches of 2020

Let us start the new year with some positive news. Despite the coronavirus pandemic, the number of data breaches in 2020 fell by 52%, at least in the first six months anyway. That said, we’ve still seen a large number of high-profile cases, some of which involving billions of exposed records. Top Data Breaches of 2020 Below is a round-up of the 20 biggest data breaches we saw in 2020. … [Read more...]

The 5 Biggest Cybersecurity Threats for the Healthcare Industry

The healthcare industry continues to grapple with a myriad of security threats, ranging from insider threats to malware and DDoS attacks. Unlike other industries, healthcare is faced with a unique set of challenges. Budgetary constraints and a general lack of executive leadership have made it very difficult for service providers to stay ahead of the curve, yet a failure to do so could cost lives. … [Read more...]

What is OneDrive for Business and What Are the Benefits?

Microsoft’s OneDrive for Business (ODFB) is a cloud storage and collaboration platform, which is easy to use and can be installed on and synced to any Android or Apple mobile device or laptop. ODFB differs from OneDrive for personal users in a number of ways, some of which include better auditing and reporting, significantly larger storage space, better integration with Office 365 for … [Read more...]

Google Drive for Business Security Best Practices

Google Drive has become an invaluable data storage facility for many organizations, as it enables employees to collaborate on projects, regardless of where they are located in the world. Is Google Drive Safe for Business? Of course, Google takes security very seriously, however, as with any cloud service provider, there are inherent risks that you need to be aware of. The most obvious risk being … [Read more...]

What is GLBA Compliance? The Gramm-Leach-Billey Act of 2019

The Gramm-Leach-Billey Act of 2019 (GLBA), is a federal law in the United States of America that has been constructed to improve visibility over how financial organizations share and protect customer information. It is sometimes known as the Financial Modernization Act of 2019. In short, to be GLBA compliant, financial organizations have to be more transparent with their customers about how they … [Read more...]

Is Data Security Essential or Optional in Today’s New World?

Few industries have fared well during the corona virus pandemic. As you would expect, most of the industries that have either stayed afloat or managed to capitalize on the crisis were those that generated a significant portion of their revenue from online sales. Online shopping, food delivery services, entertainment, gaming, e-learning, dating, and videoconferencing, were amongst the industries … [Read more...]