Remove 2016 Remove Authentication Remove Financial Services Remove Government
article thumbnail

Integrating Long-Term Digital Preservation into Your Information Governance Program: First Steps

Preservica

The 2016 IGI Benchmark Report on The Governance of Long-term Digital Information confirmed that nearly all organizations represented have digital records and information that keep or need to keep in excess of 10 years. Download the Information Governance Initiative (IGI) benchmark report and the 2017 benchmark highlights.

article thumbnail

Federal Agency Data is Under Siege

Thales Cloud Protection & Licensing

Of those organizations, 57 percent have been breached in the last year – a number that is three times the rate of just two years ago (in our 2016 report, 18 percent reported a breach within the last year, and in our 2017 report, 34 percent reported a breach within the last year). This bears out in the stats: Nearly half (45 percent) of U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Doing Digital Right (A Book Review)

Information is Currency

The challenge isn’t just managing electronic records, but non-records, content and other data as all information needs to be governed because all information provides risk because of many factors such as e-discovery, data breaches and so much more. Lamourex also extensively cites his own research for the book.

article thumbnail

FTC Seeks Comment on Proposed Changes to GLBA Implementing Rules

HL Chronicle of Data Protection

The proposed amendments follow the FTC’s receipt of public comments in 2016 regarding the Safeguards Rule as part of the FTC’s regular review cycle. Board reporting. Periodic risk assessments.

Privacy 40
article thumbnail

The Microsoft Exchange Attack Saga Continues

eSecurity Planet

This vulnerability allows an attacker to make an untrusted connection to Exchange server port 443, allowing them to send arbitrary HTTP requests and authenticate as the Exchange server. Microsoft reports that the tool has been tested for Exchange Server 2013, 2016 and 2019. The other Vulnerability Culprits.

article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Increasingly, thought leaders, professional organizations, and government agencies are beginning to provide answers. Creating an enterprise-wide governance structure. Creating an Enterprise-Wide Governance Structure. Aligning cyber risk with corporate strategy.

article thumbnail

The blockchain bowling alley: How distributed ledger technology goes mainstream

CGI

As someone engaged with blockchain projects since 2016 in CGI’s Trade Innovation Lab (and countless emerging technology projects before that), my experience is that blockchain is making the leap from experimental to production-ready solutions. What’s more, it’s poised to spill over from financial services into a wide range of industries.