Cybersecurity
More Cybersecurity Articles
Cybersecurity
Cyber Attacks Know No Barriers
Editor: What does the current cyber threat landscape appear to be? Plesco: There has been a significant increase in cyber attacks due to the development of new technologies and the utilization of those technologies by way of mobile devices, social media, cloud computing and other new media. The...
Read MoreCybersecurity
Keeping It Clean: Workshare’s Protect Gets Metadata Under Control In A Mobile World
Editor: There has been a lot of news around metadata and how this is jeopardizing the privacy of information and documents. Hadfield: Interestingly, I recently saw news reports about protests against NSA snooping in Washington, DC, and one of the placards read, “Hands off my metadata....
Read MoreHealthcare
The Cost Of A Data Breach: The Health Care Perspective
The best-known provision of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH”) was the amendment of the Health Insurance Portability and Accountability Act of 1996 to provide for the promulgation by the U.S. Department of Health and Human...
Read More