article thumbnail

GUEST ESSAY: The post-pandemic challenges of securely managing employee endpoints

The Last Watchdog

These include lurking devices (think home automation tools and other smart devices lying around in the same room your employee works or attends confidential meetings from) to sophisticated email phishing attacks using pseudo names of the CXOs (since, well everything is virtual). Tools and best practices.

Security 258
article thumbnail

Want to See the Future? Forget the Crystal Ball, Ask your CDO

Reltio

The world has faced shifts in global supply chains, healthcare, education, and workplace environments that we did not anticipate in 2019. Shaping a data-centric culture involves: Rallying the team – getting everyone on the same page when it comes to data policy, understanding the tools and systems in place, and promoting data literacy.

MDM 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

Essentially the technology is just a tool but you do need the right tool for the right job. When I put that next to digital transformation in its truest sense, a tool can give a more structured framework. What we have now in terms of tools is a far cry from what we had ten years ago.

article thumbnail

#ModernDataMasters: Carl Smith, PZ Cussons

Reltio

Essentially the technology is just a tool but you do need the right tool for the right job. When I put that next to digital transformation in its truest sense, a tool can give a more structured framework. What we have now in terms of tools is a far cry from what we had ten years ago.

article thumbnail

How to Prevent Malware: 15 Best Practices for Malware Prevention

eSecurity Planet

One bit of good news: Even widely used email services like Gmail have gotten much better at filtering out spam and malicious email, and businesses have a range of email security tools that can help. Use Antivirus Software Antivirus software and EDR tools are critically important controls for consumers and businesses, respectively.

Passwords 120
article thumbnail

What is Network Security? Definition, Threats & Protections

eSecurity Planet

Network security controls and tools should ideally shield, monitor, and secure the data in all of these environments. Endpoint security : protects endpoints with antivirus, endpoint detection and response (EDR) tools, etc. Poor Maintenance The best security tools and architecture will be undermined by poor maintenance practices.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This discussion includes methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. Thus, common tools and techniques are risk matrices, risk registers, risk logs, risk breakdown structures, risk categories, Monte Carlo simulations, and sensitivity analyses.