Remove 2016 Remove Case Study Remove Government Remove Information governance
article thumbnail

Poster boy for Information Governance

InfoGovNuggets

Years ago, while teaching a course to MBA students at Rice University, I used the Target credit card breach as a case study. And now we learn that he conducted government business over his own private gmail account {that information does not appear in the WSJ article – Ed.}, It touched a lot of bases.

article thumbnail

Today We are Launching a new Series of Information Governance Case Studies

IGI

We are pleased to bring the IGI community another series of case studies about how professionals like you are tackling IG. In 2016, we worked with IG Charter Supporter, OpenText, to create the first series of Snapshots, which is now among our most widely-read publications. Download the IG Snapshots special report here.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

In 2016, the Mirai botnet attack left most of the eastern U.S. While this case study is just a snapshot, vigilance in the app store is required. Other types of spyware might attempt to steal personal or corporate information. In 2008, the Kraken botnet with 495,000 bots infected 10% of the Fortune 500 companies.

Phishing 105