Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog February 24, 2022 The Russian Invasion of Ukraine: Its Potential Implications and Impact On February 21, after months of building up forces close to Ukraine’s borders, Vladimir Putin recognized the Luhansk and Donetsk regions of Ukraine as “independent people’s republics.” He ordered the Russian Defense Ministry to deploy troops in those regions to “maintain the peace.” These actions commenced on the anniversary of Russia’s invasion of Crimea almost eight years to the day. The… Blog February 25, 2022 Privacy Act 1988 Review: A Compliance Burden or Welcome Change? It has been more than two years since the Attorney-General’s Department announced it would be undertaking a review of the Privacy Act 1988. The review will likely result in the most substantial amendment to the Act since what we now know as the Australian Privacy Principles (APPs) were introduced in 2000. The objective of the review “will consider whether the scope of the Privacy Act… Blog February 28, 2022 City Centers Without Personal Cars or Mass Transit? Protiviti Managing Director Jonathan Wyatt Says That’s the Future Cities around the globe, no matter how well-planned or sustainability-focused, all struggle to manage vehicle traffic. Many of the vehicles clogging up their roads and undermining air quality, especially during commute hours, are personal cars. Now, what would happen if a city made the bold decision to eliminate personal cars completely from its roads? It would “immediately become a leader on… Blog February 28, 2022 Putin Pulls the Trigger and the West Responds Again: What Happens Now? On February 23, Protiviti issued a Flash Report on Vladimir Putin’s recognition of two Ukrainian regions as “independent people’s republics,” deployment of “peacekeeping forces,” and demands that Ukraine disarm and negotiate the sovereignty of the two separatist regions. The Flash Report also summarized the sanctions that had been imposed by the West in response to Putin’s aggression. Much has… Blog September 26, 2017 The 8 Character Password is Dead This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in… Blog January 19, 2018 The Tools Hackers Use to Own Your World Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the… Blog March 7, 2018 A Modern Approach to Hacking Modems In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well… Blog July 25, 2019 The Scoop On Employee Data, Deidentified Data and Loyalty Programs On July 9, over a 12-hour committee hearing, the California Senate Standing Committee on Judiciary voted on amendments for the California Consumer Privacy Act (CCPA). Tech companies, business groups, lobbyists and privacy advocates were all particularly focused on amendments AB 25, AB 846 and AB 873. AB 25 AB 25 exempts employers from some data-collecting provisions. AB 846 clarifies that… Blog July 30, 2019 What Every Organization Should Know to Keep Salesforce Secure Salesforce offers a variety of tools and solutions to help power organizations – from CRM tools such as Sales Cloud, Service Cloud, and Marketing Cloud, to ERP tools such as FinancialForce, to BI tools, such as Einstein analytics. While these tools are bringing effective new solutions to evolving business requirements, they can also introduce unanticipated risks into an organization’s application… Blog August 1, 2019 Staying Ahead of Online Job Board Scammers New technology helps define the rapidly changing world we live in. Combining the power of artificial intelligence (AI) with analytics opens a world of opportunities for organizations. But the reality of this new world is that scammers are usually close behind to put their own unique twist on those digitally driven opportunities. Online scams come in all shapes and sizes. But who would have… Load More