Click to learn more about author David Schlesinger. Deep down in the basement of your enterprise; in the hidden and dark places amid humming servers and racks of mysterious blinking equipment resides your cyber security staff. Pony tails, Red Bull cans, and black T-shirts identify some of the most devious and clever people in your company. […]
Cybersecurity Weather Report
Click to learn more about author David Schlesinger. This will be brief, as befits a weather report. However, it will need to be a little bit more specific than the typical TV weathercast. First, beware of growing internet storm clouds approaching. These storms are caused by the heating up of state-sponsored hacking groups. Many nations are […]
Defining Data Policy: The Iron Law of Data Protection
Click here to learn more about author David Schlesinger. Very seldom do we wake up in the morning with excitement about spending the day defining data policies. Little do we know that this can become a worthwhile activity and can eliminate myriad problems in the future for data administration and protection. While there appear to […]
Data Protection: How Does This Figure Into Your Architecture?
Click here to learn more about author David Schlesinger. The credit reports that your company may keep when deciding to allow credit to a new customer just might be considered confidential, especially if your billing department included judgmental remarks and evaluations. The purchase requests from your accounts payable department could potentially show which ingredients you buy […]
Data Governance Security Classifications: Are you “in the know?”
Click here to learn more about author David Schlesinger. In any enterprise of size, there is a cyber security department. Were you to partner with this team to classify corporate data you would find them able and willing to assist you. They would arrive at the data classification meetings with policies in binders and have […]
4 Enterprise Data Security Protocols to Safeguard Your Personal Data
Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]
Where is the Data Security Officer on the Organizational Chart?
Click here to learn more about author David Schlesinger. Let us be clear, your system users are mostly brilliant workers, having great knowledge and expertise in their lines of endeavor: scientists, accountants, shipping specialists, logistic planners, attorneys, HR and property experts all keep your enterprise running. They are not, however, experts in every other process in […]
All Your Data Belongs To Us – Data Security in a Global Infrastructure
Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]