191 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 6
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 8
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 8
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 10
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 8
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 9
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 10
Top 10
Infographic: Two-Question Survey on Policy Enforcement and eDiscovery
Wed, Oct 7th 2015 11
Reducing eDiscovery Costs
Fri, Jan 8th 2016 10
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 10
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 10
A Rose by Any Other Name:  It’s All Information Governance
Fri, Jan 8th 2016 9
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 9
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 9
Why Data Mapping is Critical to Managing Corporate Data
Thu, Nov 5th 2015 8
Discovery Attender: Automatic Labels
Wed, Dec 9th 2015 8
Sherpa’s Top 10 Must Reads!
Tue, Jan 26th 2016 8




Recent Blog Posts
6
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 9:21a   Marta Farensbach
Finding PCI and PII Data with Discovery Attender Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit card numbers, social security numbers, social insurance information, and health care records. As described in a previous blog article, having this Personally Identifiable information (PII) or Payment Card Industry (PCI) data loose in your sy
8
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 12:25p   Harvey Coblin
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees can work where and when they please and with hardware and applications they are already familiar with. It is estimated worldwide that one in three employees are utilizing personal devices at the w
8
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 9:13a   Rick Wilson
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding data protection regulation with the EU. It was adopted by the European Parliament Council and Commission in 2015, took effect in 2016 and enforcement is scheduled to begin in May of 2018. At its core, the GDPR is intended to provide citizens of the EU with greater control over their personal data a
10
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 2:04p   Marta Farensbach
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a strong Information Governance (IG) platform, can introduce substantial risk into your organization. In the worst cases, data breaches, adverse judgements, or non-compliance penalties could thrust a company into the glare of national headlines. Poor policy can affect more than just the finances of a
8
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 10:06a   Rick Wilson
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President Lyndon B. Johnson to establish a process whereby citizens can request copies of governmental records that are not published in the Federal Registry. Agencies, in turn, are required to provide this information in a timely fashion (usually 20 days). Although FOIA is a federal mandate, it has also
9
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 10:10a   Harvey Coblin
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in part to the fact that cybercrime can come in many forms, ranging from denial of service, theft of credit card or other financial information  (PCI/PII), industrial espionage, all the way up the ladder to state-sponsored terrorism
10
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 10:42a   Jeff Tujetsch
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’. Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness, w
8
Information Governance and the Internet of Things
Mon, May 9th 2016 10:28a   Marta Farensbach
Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very simple level, the Internet of Things (IoT) describes the freeing of communication from the domain of computers and smart phones by allowing all types of devices to share information across the internet.  ‘Things’ like cars, fridges, health monitors, water meters and so much more can be empower
9
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 9:59a   Kayla Badini
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will learn:  Why Office 365 is a compelling platform, Examples of productivity integrations, About the importance of information governance integration, Supplementing with third party software Click here to download this white paper! The post WHITE PAPER: Implementing Office 365: Inherent Features an
1
Don’t be next! Minecraft Third-Party Suffers Security Breach
Fri, Apr 29th 2016 9:04a   Sherpa Software
By now, you have heard of the security breach suffered by a Minecraft third party called Lifeboat which caused roughly 7 million user passwords to be penetrated or hacked.  The even more unfortunate part? It happened months before Lifeboat admitted to the breach.  By not being transparent, users were put at risk for further breaches.  This lack of communication could have affected users who use the same password for multiple accounts and brands, like Lifeboat, need to understand that breaches




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition