article thumbnail

Digital vs Electronic Records: Understanding the Distinction

Armstrong Archives

The terms “digital” and “electronic” are often used interchangeably these days, including when it comes to talking about records management. Digital Vs. Electronic Records – FAQs and Differences To understand the differences between digital and electronic records, let’s define each of them and look at the uses of each.

article thumbnail

Digital Vs. Electronic Records Management FAQs and Differences

Armstrong Archives

The terms “digital” and “electronic” are often used interchangeably these days, including when it comes to talking about records management. Digital Vs. Electronic Records – FAQs and Differences. To understand the differences between digital and electronic records, let’s define each of them and look at the uses of each.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply-Chain Attack against the Electron Development Platform

Schneier on Security

Electron is a cross-platform development system for many popular communications apps, including Skype, Slack, and WhatsApp. The vulnerability is not part of the applications themselves but of the underlying Electron framework -- ­and that vulnerability allows malicious activities to be hidden within processes that appear to be benign.

article thumbnail

Chronicle of a Records Manager: Controlling the Chaos of Disaster Response and Recovery

ARMA International

These undertakings require planning, communication, documentation, and collaboration to be successful. I have overseen two significant projects: an electronic discovery production and disaster response and recovery effort. The Office of Archives and Records (OAR) is the official repository for the records of the ANO.

article thumbnail

RMS Section Meeting Teaser #5

The Schedule

Not only are records creators and archives’ staff restricted from access to physical records, but most staff and faculty working remotely and often creating and storing “institutional records” on dispersed servers, such as personal computers, and in new electronic formats, including Zoom meetings.

article thumbnail

Croatia government agencies targeted with news SilentTrinity malware

Security Affairs

The SilentTrinity malware can take control over an infected computer, it allows attackers to execute arbitrary commands. The archive contents are extracted, without being saved to disk. Between February and April, allegedly state-sponsored hackers have launched a spear-phishing campaign against government agencies. .

article thumbnail

Snowden Ten Years Later

Schneier on Security

He had been working on the Edward Snowden archive for a couple of months, and had a pile of more technical documents that he wanted help interpreting. I fly a lot—a quarter of a million miles per year—and being put on a TSA list, or being detained at the US border and having my electronics confiscated, would be a major problem.