data security


The Datotel Risk Assessment Methodology

Risk assessments come in many forms, but the underlying purpose is to identify and document known risks to a given process or system and identify the consequences if that risk were to occur. With the risks both identified and quantified, … Continue reading

Posted in Company Info, Risk, Security | Tagged , , , | Leave a comment

Keeping up with HIPAA

The fact is, as technology continues to grow and change rapidly, so do rules and regulations that are intended to save us from ourselves. We’ve heard about the Health Insurance Portability & Accountability Act (HIPAA), the government act put in … Continue reading

Posted in Backup, BYOD, Cloud Computing, Datavaulting, HIPAA, Mobile, Security | Tagged , , , , , , , | Leave a comment

The Reality of BYOD Security

It doesn’t matter if you’re the CEO, CFO, CIO or the CBP (Chief Button Pusher), every one in any business is capable of unintentionally compromising security. Every business now deals with Bring Your Own Device (BYOD) issues at some level … Continue reading

Posted in BYOD, Mobile, Security | Tagged , , , , , , | Leave a comment

Email Encryption – Are your sensitive emails at risk?

Email has become the standard method for communication, but how secure are your emails? Is that confidential content secure while it traverses your internal network? While it’s inflight to the intended recipient through the internet and as it reaches their … Continue reading

Posted in Cloud Computing, Security | Tagged , , , , , | Leave a comment
  • The Datotel Risk Assessment Methodology:

    Risk assessments come in many forms, but the underlying purpose is to identify and document known risks to a given process or system and identify the consequences if that risk were to occur. With the risks both identified and quantified, … Continue reading

    ...more
  • Admin Terms of Use Contact Us