article thumbnail

1010: Electronic Records Day 2018

The Texas Record

Time to Change Your Password! The DIR Statewide Data Program overview offers ten short video segments based on the Data Management Book of Knowledge. FAQ: Why should I purge electronic records that have met retention? Search our eRecords tag to find even more of our posts focused on the topic of managing electronic records.

Cleanup 40
article thumbnail

Android Spyware Monokle, developed by Russian defense contractor, used in targeted attacks

Security Affairs

The list of functionalities implemented by the spyware includes: Track device location Get nearby cell tower info Retrieve accounts and associated passwords. Record audio and calls Suicide functionality and cleanup of staging files.

Cleanup 72
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Deletion Methods: What’s Best for Sensitive Data?

eSecurity Planet

Although, some hard drive cleanup applications can reorganize or rewrite the files on the drive to maximize continuous sectors. When a company or individual upgrades laptops, phones, or digital video recorders, older devices will usually still be of use to other people. Bad sectors will also not be accessible for reformatting.

Access 116
article thumbnail

Data Deletion Methods: What’s Best for Sensitive Data?

eSecurity Planet

Although, some hard drive cleanup applications can reorganize or rewrite the files on the drive to maximize continuous sectors. When a company or individual upgrades laptops, phones, or digital video recorders, older devices will usually still be of use to other people. Bad sectors will also not be accessible for reformatting.

Access 105