article thumbnail

Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance

Information Governance Perspectives

In May of 2020 I was honored to speak at the MERv conference with John Frost of Box on the topic of Using Information Governance with a Privacy Compliance Plan as the Fulcrum for Data Privacy and Continuous Compliance. Just think about ransomware. Below are some excerpts from my transcribed remarks. People tend to forget that.

article thumbnail

Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders

Information Governance Perspectives

Hunter, Dr. Tao Jin, Dr. Patricia Franks, Rae Lynn Haliday, Cheryl Pederson, and Wendy McLain on the topic of Meeting Evolving Business Needs – A Conversation Between RIM Educators and Thought Leaders. But that’s not entirely the role of the Records and Information Governance professional, is it?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recorded Webinar Available Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats” via GovTech

IG Guru

The post Recorded Webinar Available Cybersecurity in an Uncertain World: New Ways to Confront New Ransomware Threats” via GovTech appeared first on IG GURU.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Ransomware. Unlike ransomware, it might be a criminal operation that does not involve the collection of a ransom. These apps can steal user information, attempt to extort money from users, gain access to corporate networks, force users to view unwanted ads, or engage in other undesirable activity types. Ransomware.

Phishing 104
article thumbnail

Resolving Disputes During & Post COVID

Information Governance Perspectives

We know for example that Ransomware pirates are now even targeting law firms just as much as other sectors such as healthcare. So, this isn’t just the risk of having your files breached and exposed on the web, like say the Panama Papers incident. These are incidents that have serious financial repercussions. They’re everywhere.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Glossary of Records Management and Information Governance Terms, 5th ed., Cryptocurrency, Strategy & Education, Investopedia. Introduction. Retrieved April 2021. ARMA (2016). Retrieved April 2021.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This part also discusses managing CS risks such as ransomware, privacy, change management, and user adoption. A sinister variation of the SaaS model is Ransomware as a Service (RaaS), in which criminals on the dark web rent the service in order to launch attacks on targets. RaaS is a new business model for ransomware developers.