We use cookies on our website. By continuing to use this site, you agree to our cookie policy - Okay, Got it.

RenovoData - The Data Protection Blog

about renovodata

Data Security

RenovoData Appears in McLeod's "The Dispatch"

Published December 08, 2020 by

Navigating the new normalRenovoData appeared in the December 2020 edition of "The Dispatch" by McLeod Software. Read on...


 


 

Navigating the New Normal: How Does it Look for Your Company?

Published November 14, 2020 by

Navigating the new normalA recent article, “Navigating the New Normal: How Does it Look for Your Company?" was published in 3PL Perspectives. It discusses the importance of looking at what we have learned about conducting business during a pandemic. Read on...


 


 

Online Security for a Remote Workforce

Published August 03, 2020 by

Online Security for a Remote WorkkforceRenovoData was recently featured in an article about Online Security for a Remote Workforce in 3PL Perspectives, the third-party logistics magazine provided by the Transportation Intermediaries Association (TIA). Read the article...


 


 

The New Normal...How Does it Look for Your Company?

Published July 06, 2020 by

The The new normal...how does it look for your company? Despite the downsides of the Covid-19 pandemic, companies a rare opportunity for innovation, growth, and improvement. Learn more...


 


 

Online Security for a Remote Landscape

Published June 28, 2020 by

Online security for remote work at home Online security for a remote landscape. The growth of remote workforces has weakened many organizations’ normal protections, resulting in a new generation of malware. New varieties of fraudulent clickbait appear in the form of fictitious cures and bogus pandemic services, along with the usual scams. Learn more about some steps you can take while your employees work remotely.


 


 

Know Your Security Vulnerabilities: The Danger Is in the Details

Published May 04, 2020 by

security vulnerabilitiesRenovoData was featured in the 3PL Perspectives publication (May 2020 Edition) with this article: Know Your Security Vulnerabilities: The Danger is in the Details"The Logistics Journal is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

When Disaster Strikes, Don’t Let Fight-or-Flight Interfere with Your Recovery.

Published February 12, 2020 by

Don't reinvent the cybersecurity wheel

When emergencies arise, people are thrust into fight-or-flight mode. At these times the speed, accuracy, and thoroughness of the team’s responses can mean the difference between a company’s survival and its destruction. Learn what to do when hacker assaults, weather events, or other catastrophes threaten your data and systems.


 


 

You Don't Need to Reinvent the Security Wheel

Published January 30, 2020 by

Don't reinvent the cybersecurity wheelEvery organization with an online presence is at risk of a cyberattack and effective protection against it must be well-planned out. You don’t have to reinvent the security wheel. Establish standards that will guide you.To learn more about how to protect your company click on the link.


 


 

The Cloud Can’t Eliminate Your Responsibility for Data Protection (3PL Perspectives September 2019)

Published September 13, 2019 by

cloud blog postRenovoData was featured in the 3PL Perspectives publication (September 2019 Edition) with this article: The Cloud Can’t Eliminate Your Responsibility for Data Protection.  3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

The Pros and Cons to Single Sign-On (SSO)

Published January 17, 2019 by

single sign onSingle sign-on (SSO) is an important element in the complex structure of an effective security program. It is a service that gives a user access to multiple network destinations by entering only one login, one username, and one password. Simplifying the login process streamlines workflow and adds a layer of safety by reducing .... [Read More].


 


 

Best Practices for Preventing Email Cyberthreats (3PL Perspectives November 2018)

Published November 08, 2018 by

bestRenovoData was featured in the 3PL Perspectives publication (November Edition) with this article, which is part THREE of the three-part series that addresses cybersecurity.  This final article reaches to a higher level of safeguarding, one that stems from designated leadership and overall preparedness.  3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read More.


 


 

Digital Transformation Offers Opportunities...

Published October 23, 2018 by

Digital TransformationThe term digital transformation represents today’s continuous proliferation of digital technologies, and it also points to the speed with which they are being integrated into every area of activity. On a global scale, this steady acceleration is remaking human society, strongly affecting the ways we do business. Read More.


 


 

How Users Can Identify Email Cyberthreats (3PL Perspectives October 2018)

Published September 25, 2018 by

cyber thRenovoData was again featured in the  3PL Perspectives publication (October Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele Vayle, is part TWO of a three-part series that addresses cybersecurity.  Read More.


 


 

What Users Should Know About Email Cyberthreats (3PL Perspectives September 2018)

Published September 05, 2018 by

email cyber securityRenovoData was featured in the 3PL Perspectives publication (September Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele Vayle, is part one of a three -part series that addresses cybersecurity.  Read more.


 


 

Blockchain Brings New Capabilities, but Proceed with Caution (Logistics Journal June 2018)

Published May 31, 2018 by

Block Chain ArticleRenovoData were featured in the Logistic Journal's June 2018 edition. The article includes a series of facts about how blockchain works and what makes it so widely used, but most importantly it shared information on potential problems of the system and how to protect your company.  Read more.


 


 

Cyber Security TIA Panel, "Don’t be the next headline"

Published April 26, 2018 by

TIA Expert Panel 2017The TIA (Transportation Intermediaries Association) Conference and Tradeshow always has incredible education series. This year, once again, we were asked to join an  industry panel of experts, including our own Chuck Cook (CEO of RenovoData), plus Ben Barnes, Chief Information Security Officer at McLeod Software, Alex Hamerstone, Practice lead for Governance, Risk & Compliance at TRUSTEDSEC and moderator Brian Evans, President & CEO, L&L Freight Services, Inc.. Read more and view the video.


 


 

Blockchain makes big promises – and raises big questions

Published January 23, 2018 by

blockchainAre you aware of the challenges of Blockchain technology, in addition to how it affects your data and business continuity?Learn More...


 


 

Cyber Threats are Multiplying Rapidly, Protect your data with these three steps

Published November 30, 2017 by

logistics journal november 2017The article provides expert-level detail on cyber threats and provides three steps that can help to protect your data..  Read more...


 


 

The Internet of Things Introduces Big Possibilities for 3PLs and Trucking Companies (Logistics Journal Oct 2017)

Published November 09, 2017 by

logistics journal october 2017The article provides expert-level detail on guiding 3PL and Trucking Companies through the importance of having a solid plan and helping them to prepare for a disaster.  Read more...


 


 

Cloudy Thinking about Data Backup - Article Featured in the Logistics Journal, June 2017

Published July 05, 2017 by

Logistics Journal front cover April 2017Last month (June 2017), RenovoData were once again featured in The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to get a grasp on the realities of data backup and to avoid the traps of common misconceptions that often circulate. Learn more.


 


 

RenovoData joins a panel of experts at the TIA 2017 Conference

Published April 21, 2017 by

TIA Expert Panel 2017The TIA (Transportation Intermediaries Association) Conference and Tradeshow always has incredible education series. This year we were able to not only attend the conference but our CEO, Chuck Cook, RenovoData joined an  industry panel of experts, including Ben Barnes, IT Director at McLeod Software, Chris Hauser, Vice President, Travelers Risk Control, Cyber Program and moderator Bill Cassidy, Senior Editor, Trucking & Domestic Transport. Read more and view the video.


 


 

Network Security for 3PL and Trucking Companies - as Featured in the Logistics Journal, November 2016

Published January 10, 2017 by

RenovoData network securityarticleIn November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons!  And, of course the importance and value of testing.  Learn more and read the full article


 


 

The security onion - A single entity with many layers.

Published October 27, 2016 by

security onionEffective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded.  Learn More.


 


 

Looking for older posts? View our Archives