Giva Blog
Help Desk, Customer Service, Cloud & Security Insights, with a Side of Altruism!

The Risks and Benefits of Shadow IT

Shadow IT Technology

Shadow IT is a term used to describe solutions and systems created and applied inside organizations without their authorization. While they may not be authorized and can pose security risks, these solutions can aid in the development of new IT solutions.

[Read More]

The Increasing Strength of CSR to Change the Face of Business

CSR & Business

Any large company executive knows that corporate giving is an essential piece of their business model. What started in the mid-twentieth century as a grassroots effort to limit the power and spread the wealth of large for-profit businesses, has now been embraced by top corporations to better their company and community. The result is a revolutionized standard for how we view and operate businesses. With the ever-growing ability to interact with potential customers, corporations have discovered that people respond well to benevolence; they support the business that supports others and makes a positive impact in their community. Corporate social responsibility has successfully woven itself into the corporate world, and not only is it here to stay, it seems to be growing in power, presence, and profit.

[Read More]

Why HIPAA Violations are Becoming Common Among Healthcare Organizations

HIPAA Compliance Healthcare Organizations

In the United States, healthcare organizations are required to abide by the Health Insurance Portability and Accountability Act (HIPAA) of 1996. This act provides guidelines pertaining to the handling of patient information across a number of platforms. When healthcare organizations are looking for cloud solutions to manage their data, ensuring that it is HIPAA compliant is a necessity.

[Read More]

New Cybersecurity Laws for Canadian Businesses Coming Soon

Canadian Digital Privacy Act Cyber Security

It is no secret that Canadian businesses have struggled to bridge the gap between protecting both personal and financial data within their organizations. As a component of the Digital Privacy Act that was passed in 2015, the Canadian government is now in the final stages of enforcing legislation that will require all businesses in Canada to report any cyber security breach immediately.

[Read More]

Infrastructure & Cloud Services Becoming Important Necessities for Healthcare Organizations

Cloud Security Healthcare & HIPAA

Long gone are the days when healthcare organizations could not trust cloud security to manage their protected health information. In fact, healthcare organizations are increasing their dependence on cloud technology. What had begun as cloud deployment on back office applications has now expanded into an end-to-end solution that includes analytics and patient facing tools, among many others.

[Read More]

CISO Conferences and Summits in Canada for 2017

Customer Service Conferences & Summits in Canada

In an effort to assist our Canadian CISO clients, Giva has compiled a listing of upcoming 2017 conferences and summits. We hope this will be helpful to you!

[Read More]

Customer Service/CX Events in Canada for 2017

Customer Service Conferences & Summits in Canada

In an effort to assist our Canadian business, Giva has compiled a listing of upcoming 2017 customer service conferences and summits. We hope this will be helpful to you!

[Read More]

Cyber Security Events in Canada for 2017

Cyber Security Conferences & Summits in Canada

In an effort to assist our Canadian business, Giva has compiled a listing of upcoming cyber security conferences and summits in Canada for 2017. We hope this will be helpful to you!

[Read More]

Corporate Sustainability in Silicon Valley

Corporate Sustainability

The Center for Sustainability and Excellence (CSE) recently released a report on the sustainability of trends in Silicon Valley. The question about whether Silicon Valley corporations, of all shapes and sizes, are or are not models of sustainability, is still up for debate. Though the CSE report does provide vital research and data on this very topic, with an aim to achieve a clear cut answer.

[Read More]

How A White Hat Hacker Helped to Avoid a Healthcare Security Disaster

White Hat Hacker Helping Healthcare Data Security

On December 29, 2016, Department of Defense subcontractor Potomac Healthcare was notified about the jeopardizing of more than 11 gigabytes of private data for healthcare workers employed by the U.S. military's Special Operations Command. The compromised files were discovered by white hat hacker, Chris Vickery, who uncovered a flaw in an unprotected remote synchronization service. Upon his discovery, Vickery notified Potomac Healthcare about the insecurity of its data, which contained information dating back to 1988, and included names, locations, Social Security numbers, salaries and assignment units for psychologists, nurses and other Special Operations Command workers, some of which had top secret clearances.

[Read More]

 

Newer Entires     1   2   3   4   5   6   7   8   9   ...   20     Older Entries