Subscribe to DMU

Search DMU Library


Data Security

Cyber Resolution for Intelligent Automation

Intelligent automation can reduce the instances and effects of automated cyber attacks As adversaries employ more complex tactics, techniques, and procedures (TTPs) to successfully evade and exploit conventional security controls, organizations are clamoring to secure an increasing number of digital

Read More

Effective Data Security Strategies

Every organization needs a variety of security strategies for all areas of enterprise data management, with responsibilities assigned to business and technology teams Security threats exist against every enterprise’s information assets, whether it is accessible through the Internet or buried

Read More

Most Popular Phishing Scams

With cyber-crime on the rise and sophistication levels escalating, educating people against the most common attacks (phishing, vishing, etc.) is essential. Introduction Phishing is a technique that is used to get confidential data from individuals and companies into the hands

Read More

Agile Compliance Management

Although the need for regulatory compliance may seem to negate the ability to become or remain agile, many organizations have discovered they can adopt and use LEAN and / or agile techniques and sustain their data management and compliance activities

Read More

Cyber-bullying and Online Harassment

The pervasive and anonymous use of social media has increased the rate and frequency of online harassment and cyber-bullying, endangering the data, safety, reputation, and even lives of many people Introduction It is no secret that people are bullied, harassed,

Read More

Data Security or the Ethics of “Inappropriate Curiosity”

Ethical challenges to data usage can arise from many sources, including “inappropriate curiosity.” All organizations should enforce good ethical data management behaviors. Introduction Early reports have been disheartening. Several contractors for the Federal Government Department of State have been disciplined

Read More

Is Data Theft Your Biggest Information Governance Nightmare?

Data theft by internal staff is a serious risk for every organization, regardless of industry or size. Establishing a strong Information Governance framework to defend against this risk is an essential practice. Introduction According to the Washington Post, Insurance Journal and other

Read More

Examining Data Privacy Impact Assessments

A Privacy Impact Assessment, or PIA, is an analysis of how personally identifiable information (PII) is collected, used, shared, and maintained across the organization and externally Introduction Along with all the other acronyms concerning privacy, PII (Personally Identifiable Information), GDPR

Read More

Foundations of Data Security

Effective data security ensures that the right people can use and update data as it was intended to be used, and that all inappropriate access and update is prohibited. Protecting sensitive data is the ultimate goal of all information technology

Read More