26 March, 2019 | Ryan Brooks

The CIA Triad and Its Real-World Application

What is the CIA triad? Information security revolves around the three key principles:  confidentiality, integrity and availability (CIA). Depending upon the environment, application, context or use case, one of these principles might be more important than the others. For example, for a financial...
30 January, 2019 | Matt Middleton-Leal

How to Prevent Intellectual Property Theft by Insiders

Intellectual Property (IP) is often the most important asset that a company has, because development of innovative solutions is the most efficient way for companies to compete in an all-tech world. Unlike patents, which can secure the right of exclusivity in exchange for public disclosure, IP...
23 January, 2019 | Matt Middleton-Leal

Top 5 Human Errors that Impact Data Security

Tighter data protection regulations have forced businesses to put data security at the top of their priority list. However most companies still lack a strong cybersecurity culture among their employees. In fact, a recent paper by Osterman Research reports that less than half (42%) of organizations...
26 December, 2018 | Jeff Melnick

Understanding SharePoint Permissions

The Purpose of SharePoint Permissions SharePoint permissions control the access that employees, partners, third-party suppliers and others have to your SharePoint content. You can choose who can read specific information and who cannot. SharePoint permissions extend not only to display data in...
3 May, 2018 | Jeff Melnick

Differences Between Share and NTFS Permissions

NTFS and share permissions are both often used in Microsoft Windows environments. While share and NTFS permissions both serve the same purpose — preventing unauthorized access — there are important differences to understand before you determine how to best perform a task like sharing a folder....
Show more articles