Protect to Preserve: Information, Observations, and Things to Ponder_Encounter 2

 The new issue of information, observations, and things to ponder can be found in pdf form here

 

 

Secure Your Stuff

Section Research Volunteer, Jeff Lundgren, asks if you have done
a “systems review” in starting the new year off right. He explains some reasons why this part of every-day security awareness is so important. This is followed by a few more tips on securing your stuff, continued from the November 2020 text in our
First Encounter

Quiz

What do you know about IoT?? (Page 2)

A Quote for This Day

The voice of others offering a view on security, offered here as something to consider or tr discuss among colleagues. (Page 2)

 

Archival Term- Add it to your vocabulary

What do You Know about Certificate Authorities? (Page 2)

The Criminal Hacker: Tools of the Trade

Just how many ways does a cybercriminal use to take what rightfully belongs to someone else? Some of their skills might surprise you.  (page 2)

Let’s Go Phishing!

A screenshot of a “phishing” email sent by cybercriminals. What do you see that would lead you to suspect the email is a “phishing” attempt?  Can you tell why it is effective, even agains those who might be alert to phishing? Practice is the best defense against phishing attacks. (Page 3)

Answer to Quiz- and More (page 4)

AttachmentSize
SecuritySection_ProtectToPreserve_2_Jan2021.pdf1.2 MB

Society of American Archivists does not assume responsibility for the opinions and views published on this site.

109018 says:
This article really nails how

This article really nails how technology isn’t just a “nice add-on” anymore — it’s a core driver of efficiency, innovation, and growth across virtually every industry. From cloud platforms and automation to data analytics, these tools are reshaping how businesses operate and compete. One specific example that ties into this trend is the use of IoT in inventory management, where connected sensors and real-time tracking can drastically reduce stockouts, cut waste, and give companies much better visibility into their supply chain performance. Great food for thought on where tech is headed!

Elowen says:
How are winners selected in the SBI Monopoly campaign?

 the selection process is governed by predefined rules and eligibility criteria. Winners are chosen according to campaign terms, ensuring fairness within the framework. The procedure is outlined under the monopoly big baller details, where transparency and structure are clearly explained.