Remove Examples Remove Exercises Remove Mining Remove Video
article thumbnail

How to Tackle the Information Management Challenges of Legacy Applications

AIIM

Relocating the data from a legacy system to a modern ECM system is also a relatively simple one-off exercise that should quickly pay for itself. For example, organizational restructuring such as mergers and acquisitions can result in staff needing to access multiple, similar systems to respond to a single customer request.

ECM 166
article thumbnail

Sustaining Performance Under Extreme Stress

Troy Hunt

The thing that perhaps surprised me most about those discussions with friends was how much their own stories resonated with mine. A perfect example is that the house purchase fell through due to the vendor not being agreeable to the terms I set forth. Legal jargon in contracts is a prime example.

Sales 142
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

I've written before about what's involved in verifying data breaches and it's often a non-trivial exercise. For people wanting to go deeper, check out Shape Security's video on credential stuffing.) This gives you a sense of the origins of the data but again, I need to stress "allegedly".

article thumbnail

The Trouble with Politicians Sharing Passwords

Troy Hunt

Particularly when we're talking about public figures in positions of influence, we need to see leadership around infosec, not acknowledgement that elected representatives are consciously exercising poor password hygiene. The most impactful example of this is Edward Snowden persuading NSA colleagues to provide their credentials to him.

article thumbnail

Sharenting, BYOD and Kids Online: 10 Digital Tips for Modern Day Parents

Troy Hunt

My views are shaped by a life that's very public due to the nature of what I do and as such, my kids receive more exposure than most (the picture above, for example). For example, my son teaching kids to code in London a couple of weeks ago: Teaching kids to code at #NDCLondon with @CodeCombat. They can't change their passcodes.

Privacy 141
article thumbnail

Project Svalbard, Have I Been Pwned and its Ongoing Independence

Troy Hunt

For example, I was regularly asked if I'd ever received any legal threats which is apparently pretty normal for any M&A process, but you can imagine why it'd be particularly interesting when dealing with a heap of data originally obtained via illegal methods. of the company.

IT 136
article thumbnail

How to Track Your Kids (and Other People's Kids) With the TicTocTrack Watch

Troy Hunt

For example, there was VTech back in 2015 who leaked millions of kids' info after they registered with "smart" tablets. Wearco produces "mining consumables". Wearco produces "mining consumables". It's the little things that keep popping up, for example the language and grammar in the aforementioned user manual.

Passwords 111