Quantcast
Channel: Sherpa Software
Browsing latest articles
Browse All 33 View Live

Image may be NSFW.
Clik here to view.

WHITE PAPER: Implementing Office 365: Inherent Features and the Need for...

In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will...

View Article



Image may be NSFW.
Clik here to view.

Information Governance and the Internet of Things

Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very...

View Article

Image may be NSFW.
Clik here to view.

How to Survive Data Discovery in the Digital Age

eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because...

View Article

Image may be NSFW.
Clik here to view.

Breach of Security: Measuring the Cost of Cyber Crime

Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as...

View Article

FOIA reforms are on the way, are you ready?

If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President...

View Article


Targeting Risks in IT – 5 Things to Consider

Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a...

View Article

Understanding the General Data Protection Regulation

If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding...

View Article

Bring Your Own Device & Data Security

With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes....

View Article


Finding PCI and PII Data with Discovery Attender

Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit...

View Article


Ways to avoid Information Governance pitfalls

Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two...

View Article
Browsing latest articles
Browse All 33 View Live




Latest Images