Skip to main content

Posts

Showing posts from August, 2022

Cybersecurity sees everything

We should mean almost, digitally. With serious considerations to best practices, widely acceptable principles including that of, directly and indirectly related, applicable laws and, if any, for the sake of thoughtful and sensible transparency. Almost everything, in this case is about, as nations and industries are already taking it as an initiative to protect entities such as people, enterprises, assets, properties including but not limited to information, which is the sole subject of information security specialists but it's reality is more complicated than arguing on which security can cover which area. Technology practitioners should appreciate it. Those who goes beyond a few specializations could realized it and make an effective position paramount to a cybersecurity responsibility. And the size of that responsibility may mean breaking and delegating it with various roles, with those who are effective and prudent in their jobs.

Online information provided for stakeholders' consumption

It must relay the true meaning and real application necessary in the physical world. We have probably all experience how to learn first thing about our plans before we go ahead and act. Like for instance, when we order something online, attend to some responsibilities for our organizations, communicate with people via video, chat and email including but not limited to asking stakeholders, very politely and sincerely, if there's anything else we can do to help further. This online environment must make us work to facilitate and relay exactly what we expect and do in the physical world. What the online information is telling us should be enough to readily make a decision and act accordingly. This is especially true when people have to do it themselves, read relevant information and will go there, say store, or anywhere else, to perform the chores required.  We cannot provide information online, when customers expect them to be a guideline or instruction to do something, that we know ...

Privacy Impact Assessment

Do you know what makes a Privacy Impact Assessment effective? Organizations doing privacy impact assessment or PIA must make sure that their language and questioning is directed to the party which they required both practical (meaning completeness of processes being utilized) and truthful answer from. If the PIA itself was designed and developed collectively by business, technology, legal and compliance practitioners putting every relevant element as a subject of business objectives, which doesn't tolerate counterproductive actions, then one might say, it's really hard to do this but then it would conclude and it's the best way to get into it really. No guilty feelings. It's what the people really would experience which is considerably good and ultimately the organization's safety is better emplaced in the face of the searing cyberspace. A PIA that's entirely an initiative of inexperience practitioner or a beginner in the job would show its shallowness and that ...