We use cookies on our website. By continuing to use this site, you agree to our cookie policy - Okay, Got it.

RenovoData - The Data Protection Blog

about renovodata

Network Security

Know Your Security Vulnerabilities: The Danger Is in the Details

Published May 04, 2020 by

security vulnerabilitiesRenovoData was featured in the 3PL Perspectives publication (May 2020 Edition) with this article: Know Your Security Vulnerabilities: The Danger is in the Details"The Logistics Journal is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read on...


 


 

Blockchain makes big promises – and raises big questions

Published January 23, 2018 by

blockchainAre you aware of the challenges of Blockchain technology, in addition to how it affects your data and business continuity?Learn More...


 


 

Cyber Threats are multiplying rapidly.

Published November 07, 2017 by

Cyber SecurityYou can protect your Data with these three steps.

Cyber Security Threats are nothing new, but the recent explosive growth has become a global concern. News reports of such attacks have become commonplace. The September 20, 2017 issue of PC Magazine states that In the first half of 2017, there were 1.9 billion data items compromised worldwide, compared to 1.38 billion for the entire year of 2016.

While cyber-attacks against major corporations and governments make headlines, upwards of 70% of these breaches target small businesses, so every organization with an online presence is vulnerable. Learn (a lot) more...


 


 

Network Security for 3PL and Trucking Companies - as Featured in the Logistics Journal, November 2016

Published January 10, 2017 by

RenovoData network securityarticleIn November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons!  And, of course the importance and value of testing.  Learn more and read the full article


 


 

Looking for older posts? View our Archives