Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Recognizing the Human Factor in IT Governance September 20, 2022

by Jeanne Zepp

The Gartner Glossary defines information technology (IT) governance as “the processes that ensure the effective and efficient use of IT in enabling an…

read more
Blog
Why Use Multi-Factor Authentication to Foil Phishing Attacks August 18, 2022

by Sutapa Ghadial

With the passage of time and advancements in technology, phishing attempts that lure unsuspecting victims into disclosing their login credentials are getting more sophisticated and realistic.

In a phishing attack, the perpetrator sends an email or…

read more
Blog
Appreciating Artificial Intelligence August 03, 2022

by Jeanne Zepp

July 16th marked the second celebration of Artificial Intelligence (AI) Appreciation Day. Created in 2021, the day recognizes ways in which AI is…

read more
Blog
Why Are Federal Agencies Adopting RPA Now? What Are the Benefits? July 27, 2022

by Kirubeal Mandefro

According to a federal Robotic Process Automation (RPA) Community of Practice publication, RPA is “a low- to no-code Commercial Off the Shelf (COTS) technology that can automate repetitive…

read more
Blog
To Pay or Not To Pay … Is That the Ransomware Question? July 05, 2022

by Jeanne Zepp

Organizations face a complex decision when their systems are encrypted, their data exfiltrated and their operations brought to a halt. There is no universal prescription for how an organization should respond.

The Federal Bureau of Investigation,…

read more
Blog
Passing on Passwords June 09, 2022

by Jeanne Zepp

We all struggle with passwords. Creating them. Remembering them. Updating them. Protecting them. We pride ourselves in our cleverness in devising ones that go beyond “qwerty” or “12345,” believing we can outsmart hackers. Yet, one…

read more
Blog
Top