The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although…
We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we’ll be considering the culture of protection the…
“Hello! My Name is Phoummala and I have re-occurring imposter syndrome. I struggle with this frequently and it’s a battle that I know I am not alone in.” What is…
In the previous blog in this series, we reviewed several types of attacks and threats, and some ways they are perpetrated. In this blog, we will become familiar with several…
As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. How…
If you work in engineering or support, you’ve probably spent a lot of time troubleshooting things. You’ve probably spent just as much time trying to figure out why things were…
The technology industry is about technology. Technology is the fastest changing industry there is, but the often-overlooked part of this industry is the humans that work with the technology. Humans…