An important part of Governance is to have good documentation that shows how you protect your devices, users and information. But before you can document this in your governance plans, you must of course have made some assessments and implemented necessary measures. Continue reading “Some basic steps to protect your organization’s devices, users and information”
An accident happens so easily.
What if your files are deleted or overwritten? They may even become corrupt or in the worst case infected with malicious software. It starts to creep in the body and whizzes in the ears. The butterflies begin to flaunt in your stomach and the sweat rushes into your forehead. What in the world should you do now? Continue reading “Oh no! What has happened to my files !!!”