Giva Blog
Stay in Touch with Giva's News & Updates

Case Studies in CSR: Samsung "Solve for Tomorrow" Contest

Samsung Solve for Tomorrow

The 6th annual Samsung Solve for Tomorrow Contest wrapped up earlier this year, and in doing so, provided $2 million in Samsung Technology to public schools across the United States. The Solve for Tomorrow Contest was launched in 2010 by Samsung to support and encourage science, technology, engineering and math (STEM) education among K-12 students. The goal is to increase students' enthusiasm for STEM learning while also encouraging them to use that learning to help make a difference in their community. Samsung partners with BrainPoP, the National Environmental Education Foundation, and Adobe to make this contest possible. Entry into the contest is straightforward: contestants make a two-minute video describing how their project improves their community.

[Read More]

CEO Scams Becoming Increasingly Dangerous Threat

CEO Email Fraud

The Federal Bureau of Investigation heeded caution from reports of an increase in CEO fraud email scams. CEO fraud occurs when a hacker fakes a message from the CEO of a company and attempts to persuade an employee to transfer funds to an unnamed beneficiary or provide private information of its employees.

[Read More]

Hospitals Vulnerable to Camouflaged Malware Infiltration

Hospitals & Malware

Data security in the healthcare industry is crucial for patient health and safety. By using camouflaged old malware, cyber attackers have been able to penetrate existing data systems. Old malware using a new identity render these viruses unidentifiable by antivirus systems used in the healthcare industry.

[Read More]

The Internet of Things

Internet of Things

The Internet of Things is a system of computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without the assistance of computers interacting with humans or other computers.

A "thing" in the Internet of Things (IoT) can be a person with an implanted electronic device, an animal with a transponder chip, a car fitted with technology that senses when a driver is exiting their lane, or any other object that can be assigned an IP address and has the ability to transfer data over a network.

[Read More]

CSR Spotlight: LEED Certifications Demonstrate Excellence in Green Buildings


In the United States, buildings account for 38% of all CO2 emissions, 73% of electricity consumption, and nearly 14% of potable water used per year. Both companies and consumers are becoming increasingly aware of their impact on the environment. 61% of corporate leaders think that sustainability helps companies improve their financial performance and differentiate themselves in the market.

Leadership in Energy and Environmental Design (LEED) certification is a way to demonstrate the quality and achievement of a building's or neighborhood's green features. LEED certifies 1.85 million square feet of construction space every day, making it the most widely used green building rating system in the world. The U.S. Green Building Council estimates that every day nearly 5 million people experience a LEED building.

[Read More]

Data Breach Trends in Higher Education

Data Breaches Higher Education

With higher education becoming increasingly more available, data breaches are on the rise as well. Colleges are responsible for compliance with security regulations, such as FERPA (Family Educational Rights and Privacy Act), as well as attempting to monitor use of personal devices as they have become a crucial component of classrooms and campus life. Hackers are targeting educational institutions more than ever, so effective data security is critical.

[Read More]

Pro Bono Week, October 23-29, 2016

Pro Bono Week 2016

The American Bar Association is encouraging everyone to join in the celebration of their eighth annual National Pro Bono Week, October 23-29, 2016. The event was created in 2009 to commemorate the efforts of volunteer lawyers and other social workers advocating for low-income citizens, and encourage the creation of events throughout the week to improve community justice efforts.

[Read More]

CSR Spotlight: Expedia is Helping Cancer Patients See the World

Expedia Dream Adventures

Between treatment, hospitalization, pain and fear, children battling cancer often have fewer opportunities to travel and go on adventures in the outside world. Additionally, as escapism serves as a comfort to many cancer patients, the inability to go on outdoors adventures can be disheartening.

Recently, Expedia has joined forces with St. Jude Children's Research Hospital to bring global adventures to young cancer patients through Expedia's Dream Adventures program. After learning of a child's greatest travel dreams, Expedia volunteers travel to these locations to make these dreams a reality. Using 360° cameras and live-streaming technology, the volunteers film these adventures while the child sits in a room with the real-time footage projected on the walls. Children can interact with the volunteers and play an active role in their adventures.

[Read More]

4 Keys for Integrating ITIL and the Cloud

ITIL & the Cloud

As businesses move to the cloud, IT Service Management (ITSM) tools within the cloud are becoming increasingly common. The IT Information Library (ITIL) best practice approach to ITSM does not currently target the cloud, but its best practice approach to service management has resonated throughout the cloud-based application industry. This approach allows organizations to use IT to realize business change, transformation, and growth. ITIL's principles have been implemented in efficient and cost effective cloud-based analytical software applications today, however, further updates are required to target the following specific areas:

[Read More]

Why Succumbing to Cyber Extortion is Dangerous

Cyber Crime, Ransomware & Data Security

On February 5, 2016, the use of ransomware on Los Angeles' Hollywood Presbyterian Medical Center caused a shutdown of their systems and served as a reminder of the increasingly pressing issue of cyber extortion. The hospital released a statement reassuring that neither patient care nor employee or patient information were compromised during the attack. The statement also clarified that initial reports that the hospital paid $3.4 million to the hackers were mistaken, but the hackers walked away with just short of $18K, as it was deemed the "quickest and most efficient way" to obtain the decryption key so they could regain access to their systems. The issue with this statement is that paying the ransom does not guarantee the return of data. In fact, most IT and security resources agree that paying is confirmation to cyber attackers that they should return in the future.

[Read More]


1   2   3   4   5   6   ...   58     Older Entries