article thumbnail

Information Literacy and Records Management

Brandeis Records Manager

Should it exclude responsibly destroying or deleting redundant, obsolete, and trivial (ROT) info? Should it exclude avoiding rogue apps, weak passwords, and phishing attempts? Should it exclude intuitive and functional folder naming to enhance knowledge sharing? Should info literacy exclude documentary version control?

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Therefore, organizations must protect themselves from cyber risks and attacks such as: Denial-of-services (DoS) and distributed denial-of-service (DDoS) Phishing and spear phishing Man-in-the-middle (MitM) SQL injection Cross-site scripting (XSS) Ransomware.