Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

Hospitals Vulnerable to Camouflaged Malware Infiltration

Hospitals & Malware

Data security in the healthcare industry is crucial for patient health and safety. By using camouflaged old malware, cyber attackers have been able to penetrate existing data systems. Old malware using a new identity render these viruses unidentifiable by antivirus systems used in the healthcare industry.

[Read More]

The Internet of Things

Internet of Things

The Internet of Things is a system of computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers and the ability to transfer data over a network without the assistance of computers interacting with humans or other computers.

A "thing" in the Internet of Things (IoT) can be a person with an implanted electronic device, an animal with a transponder chip, a car fitted with technology that senses when a driver is exiting their lane, or any other object that can be assigned an IP address and has the ability to transfer data over a network.

[Read More]

CSR Spotlight: LEED Certifications Demonstrate Excellence in Green Buildings


In the United States, buildings account for 38% of all CO2 emissions, 73% of electricity consumption, and nearly 14% of potable water used per year. Both companies and consumers are becoming increasingly aware of their impact on the environment. 61% of corporate leaders think that sustainability helps companies improve their financial performance and differentiate themselves in the market.

Leadership in Energy and Environmental Design (LEED) certification is a way to demonstrate the quality and achievement of a building's or neighborhood's green features. LEED certifies 1.85 million square feet of construction space every day, making it the most widely used green building rating system in the world. The U.S. Green Building Council estimates that every day nearly 5 million people experience a LEED building.

[Read More]

Data Breach Trends in Higher Education

Data Breaches Higher Education

With higher education becoming increasingly more available, data breaches are on the rise as well. Colleges are responsible for compliance with security regulations, such as FERPA (Family Educational Rights and Privacy Act), as well as attempting to monitor use of personal devices as they have become a crucial component of classrooms and campus life. Hackers are targeting educational institutions more than ever, so effective data security is critical.

[Read More]

Pro Bono Week, October 23-29, 2016

Pro Bono Week 2016

The American Bar Association is encouraging everyone to join in the celebration of their eighth annual National Pro Bono Week, October 23-29, 2016. The event was created in 2009 to commemorate the efforts of volunteer lawyers and other social workers advocating for low-income citizens, and encourage the creation of events throughout the week to improve community justice efforts.

[Read More]

CSR Spotlight: Expedia is Helping Cancer Patients See the World

Expedia Dream Adventures

Between treatment, hospitalization, pain and fear, children battling cancer often have fewer opportunities to travel and go on adventures in the outside world. Additionally, as escapism serves as a comfort to many cancer patients, the inability to go on outdoors adventures can be disheartening.

Recently, Expedia has joined forces with St. Jude Children's Research Hospital to bring global adventures to young cancer patients through Expedia's Dream Adventures program. After learning of a child's greatest travel dreams, Expedia volunteers travel to these locations to make these dreams a reality. Using 360° cameras and live-streaming technology, the volunteers film these adventures while the child sits in a room with the real-time footage projected on the walls. Children can interact with the volunteers and play an active role in their adventures.

[Read More]

4 Keys for Integrating ITIL and the Cloud

ITIL & the Cloud

As businesses move to the cloud, IT Service Management (ITSM) tools within the cloud are becoming increasingly common. The IT Information Library (ITIL) best practice approach to ITSM does not currently target the cloud, but its best practice approach to service management has resonated throughout the cloud-based application industry. This approach allows organizations to use IT to realize business change, transformation, and growth. ITIL's principles have been implemented in efficient and cost effective cloud-based analytical software applications today, however, further updates are required to target the following specific areas:

[Read More]

Why Succumbing to Cyber Extortion is Dangerous

Cyber Crime, Ransomware & Data Security

On February 5, 2016, the use of ransomware on Los Angeles' Hollywood Presbyterian Medical Center caused a shutdown of their systems and served as a reminder of the increasingly pressing issue of cyber extortion. The hospital released a statement reassuring that neither patient care nor employee or patient information were compromised during the attack. The statement also clarified that initial reports that the hospital paid $3.4 million to the hackers were mistaken, but the hackers walked away with just short of $18K, as it was deemed the "quickest and most efficient way" to obtain the decryption key so they could regain access to their systems. The issue with this statement is that paying the ransom does not guarantee the return of data. In fact, most IT and security resources agree that paying is confirmation to cyber attackers that they should return in the future.

[Read More]

Giva Salutes: Psychiatric Rehabilitation Services

Psychiatric Rehabilitation Services

At Giva we search for organizations, large and small, that are doing a great job of changing the world around them for the better; and we are pleased to salute them here!

Psychiatric Rehabilitation Services is a nonprofit organization that serves communities impacted by mental illnesses. Their clients come from all walks of life, representing all ethnicities, ages, and communities as they face life-long battles with mental disorders, mental disability, and the crippling stigmas behind these personal health issues. Clients who have also experienced drug abuse and psychiatric stress are welcomed with open arms and understanding hearts.

[Read More]

Applying Today’s Technological Landscape to ITIL

ITIL & Today's Technology

The technologies available to consumers and businesses are, undoubtedly, developing at a rapid pace. People have new demands when it comes to their technological needs. ITIL, the Information Technology Infrastructure Library, provides guidance for IT service providers on how to bring IT best practices and business needs together, giving companies the tools to approach many kinds of IT challenges. The capability of applying it to a variety of situations and vendors makes it a go-to resource for many service providers when looking towards solutions for complex business problems in both customer service and IT support. The last time that ITIL was updated, however, was in 2011. While it may not seem that long ago, the last five years have brought many changes in the technological landscape, and ITIL alone may not be the most effective way to find an answer.

[Read More]


Newer Entires     1   ...   3   4   5   6   7   8   9   10   11   12   13   ...   65     Older Entries