Information Security Leader, Author, Instructor and Speaker

Default utility Image

How Agencies Can Secure Data from Shared Documents After Users Leave TAGS: A decade ago, agencies struggled to build collaborative workplaces because the technology to facilitate teamwork simply didn’t exist. The advent …Continue reading →

Default utility Image

Best Practices for Ensuring Data Security in the Cloud TAGS: | | | Cloud solutions offer virtually limitless potential to educators. From interactive learning management systems to parent communication portals, cloud-based technologies provide …Continue reading →