Skip to content
Zombie Data
  • Home
  • Blog
  • Agile BI Program
  • Boost Your BI Speed
  • Data Recovery
  • About
  • Book a Call
  • Business Continuity
  • Disaster Recovery
  • Data Recovery
  • Business Intelligence

Charles Highsmith

security logo

Strengthening American Cybersecurity Act of 2022

October 14, 2022September 9, 2022 by Charles Highsmith

The Strengthening American Cybersecurity Act (SACRA) is a new law aimed at modernizing the federal government’s cybersecurity laws. It was recently approved by the President … Read more

Categories Business Continuity, Cyber Security, Government Tags American Cybersecurity Act, Cybersecurity
close up view of system hacking in a monitor

The SEC’s Cybersecurity Regulation and Compliance Rule

September 9, 2022 by Charles Highsmith

The SEC is considering a new rule to increase transparency and protect investors from cybersecurity threats. The new rule would make companies more accountable for … Read more

Categories Business Security, Cyber Security Tags Compliance, Cybersecurity, Cybersecurity Proposed Rule, Regulation, Regulation and Compliance, SEC, XBRL
man with binary code projected on his face

What is Business Cybersecurity?

September 7, 2022September 7, 2022 by Charles Highsmith

In a nutshell, cybersecurity is the practice of protecting your computer systems and networks from cyber attacks. In a more technical sense, cybersecurity also involves … Read more

Categories Business Continuity, Business Security, Cyber Security Tags Cybersecurity, Employee education, Phishing, Security protocols
man people night dark

Summer Phishing

August 10, 2022 by Charles Highsmith

 Security, Training Our initial Catch Phish release provided you with an incredible solution that addressed the human factor and phishing attacks.  Nonetheless, we knew it could be more … Read more

Categories Cyber Security Tags Phishing
man in blue suit jacket holding white paper and ballpen

Regardless of Your Business Size, You’re a Target

August 10, 2022April 20, 2022 by Charles Highsmith

Many people in healthcare make the incorrect assumption that their business won’t be a target for cybercriminals because they are “just a one-man show” or … Read more

Categories Cyber Security Tags Data Recovery, Data Security

An Introduction: Employee Cybersecurity Assessment

August 10, 2022April 20, 2022 by Charles Highsmith

Introducing the Employee Cybersecurity Assessment is an easy and effective way to protect your company’s network. Hackers are looking for new victims every day. In … Read more

Categories Cyber Security Tags Data Recovery, Data Security
crop cyber spy typing on computer keyboard while hacking system

What Is Cyber Security?

August 10, 2022April 19, 2022 by Charles Highsmith

Today’s average consumer is expected to own 13 digital devices If you’ve heard of cyber security, you’re probably familiar with the term and the technology … Read more

Categories Cyber Security Tags Data Recovery, Data Security
Cyber Security

Cyber Security Expertise

August 10, 2022January 20, 2022 by Charles Highsmith

Cyber security is a field of expertise that is booming. There is an urgent need for skilled professionals, and the shortage of qualified cyber security … Read more

Categories Cyber Security Tags Data Recovery, Data Security
Hard Drive Failures Can Be Devastating For Data Recovery

Hard Drive Failures Can Be Devastating For Data Recovery

August 10, 2022June 13, 2021 by Charles Highsmith

In computer sciences, data recovery is an efficient process of restoring inaccessible, lost, corrupt, damaged, formatted or unreadable data from removable media, computers or other devices, when … Read more

Categories Data Recovery, Disaster Recovery Tags Data Recovery, Data Security
Explore the Complete Picture

Explore the Complete Picture

August 10, 2022June 13, 2021 by Charles Highsmith

Business Intelligence covers the strategies and techniques applied by businesses for the analysis of company data. This includes data analysis, market study, decision modeling, and forecasting, … Read more

Categories Business Intelligence Tags Data Recovery, Data Security
Older posts
Page1 Page2 Next →
+ More
security logo

Strengthening American Cybersecurity Act of 2022

Business Continuity, Cyber Security, Government
close up view of system hacking in a monitor

The SEC’s Cybersecurity Regulation and Compliance Rule

Business Security, Cyber Security
man with binary code projected on his face

What is Business Cybersecurity?

Business Continuity, Business Security, Cyber Security
Strengthening American Cybersecurity Act of 2022

Strengthening American Cybersecurity Act of 2022

The SEC’s Cybersecurity Regulation and Compliance Rule

The SEC’s Cybersecurity Regulation and Compliance Rule

What is Business Cybersecurity?

What is Business Cybersecurity?

Summer Phishing

Summer Phishing

Regardless of Your Business Size, You’re a Target

Regardless of Your Business Size, You’re a Target

An Introduction: Employee Cybersecurity Assessment

An Introduction: Employee Cybersecurity Assessment

Categories

  • Agile Business Intelligence
  • Business Continuity
  • Business Intelligence
  • Business Security
  • Cyber Security
  • Data Recovery
  • Disaster Recovery
  • Government

Recent Posts

  • Strengthening American Cybersecurity Act of 2022
  • The SEC’s Cybersecurity Regulation and Compliance Rule
  • What is Business Cybersecurity?
  • Summer Phishing
  • Regardless of Your Business Size, You’re a Target
  • An Introduction: Employee Cybersecurity Assessment
  • What Is Cyber Security?
  • Cyber Security Expertise
© 2025 A service of Zombie Data
Next Page »
  • Home
  • Blog
  • Agile BI Program
  • Boost Your BI Speed
  • Data Recovery
  • About
  • Book a Call