Remove Computer and Electronics Remove Document Remove Government Remove Tools
article thumbnail

NEW TECH: DigiCert Document Signing Manager leverages PKI to advance electronic signatures

The Last Watchdog

Most of us, by now, take electronic signatures for granted. Popular services, like DocuSign and Adobe Sign, have established themselves as convenient, familiar tools to conduct daily commerce, exclusively online. Yet electronic signatures do have their security limitations. That’s what Document Signing Manager does.

article thumbnail

Ukraine: nation-state hackers hit government document management system

Security Affairs

Ukraine ‘s government attributes a cyberattack on the government document management system to a Russia-linked APT group. The Ukraine ‘s government blames a Russia-linked APT group for an attack on a government document management system, the System of Electronic Interaction of Executive Bodies (SEI EB).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT28 used new malware in a recent phishing campaign

Security Affairs

The Computer Emergency Response Team of Ukraine (CERT-UA) warned of a new cyber espionage campaign carried out by the Russia-linked group APT28 (aka “ Forest Blizzard ”, “ Fancybear ” or “ Strontium ”). CERT-UA discovered multiple phishing attacks aimed at government organizations between December 15 and December 25.

Phishing 118
article thumbnail

Capturing Paper Documents - Best Practices and Common Questions

AIIM

Also known as “capture,” this capability is characterized by the ability to scan paper documents to store and use them in digital form instead of paper. First developed over 30 years ago, capture systems have evolved from simple solutions for basic scanning into sophisticated and expensive systems for enterprise-wide document automation.

Paper 90
article thumbnail

Rethinking Acceptable Use Polices

AIIM

A staple of many Information Technology (IT) policy suites is the Acceptable Use Policy (AUP), intended to govern what people working in the organization can and cannot do with the technology we provide them. Each activity on the list above is an activity that was prohibited in many organizations long before the computer arrived.

article thumbnail

GDPR and The Data Governance Imperative

AIIM

GDPR and the Data Governance Imperative. The confluence of big data, cloud computing, social media, mobile devices collect and aggregate diverse data sets, which taken together, such as internet search habits and GPS tracking information may expose personally identifiable information. The Information Governance Imperative.

GDPR 91
article thumbnail

How should you investigate a data breach?

IT Governance

This might be, for example,the victim’s computer, a web page or a physical space in which documents were compromised. Means : the tools that were used to commit the crime, such as malware, hacking expertise or access to a user’s login credentials. Fortunately, most IT departments have the necessary tools to unearth vital clues.