PGH Networks

Connor Grieb

Data Retention Policy

Why a Data Retention Policy Is Necessary

What Is a Data Retention Policy?  A data retention policy guarantees that businesses follow a uniform procedure for archiving and deleting their data. Different types of data should be listed together with their formats, storage locations, and retention periods. Keeping costs under control also requires effective, legal data disposal. The policy should specify who in […]

Why a Data Retention Policy Is Necessary Read More »

Digital Trust Explained

WHAT IS DIGITAL TRUST? TechTarget best defines Digital Trust as “the confidence users have in the ability of people, technology and processes to create a secure digital world. Digital trust is given to companies who have shown they can provide safety, privacy, security, reliability, and data ethics with their online programs or devices.”   AREAS OF

Digital Trust Explained Read More »

IT risk management

IT Risk Management: What is it?

What is Risk Management in Information Technology (IT)? Information technology risk management, also known as “information security risk management,” refers to the policies, practices, and technologies that a business employs to counteract threats from bad actors and lessen information technology flaws that have a negative impact on data confidentiality, integrity, and availability. Basics of IT

IT Risk Management: What is it? Read More »

SHOP SAFELY THIS HOLIDAY SEASON

The holiday season is in full swing, with many shopping online and in person. Cybercriminals know the increase in traffic and shopping behaviors change this time of year due to the chaos of the holidays and the need to get the “perfect gift.” The guard may be down for many consumers, but it is no

SHOP SAFELY THIS HOLIDAY SEASON Read More »

WINDOWS 11 IS AVAILABLE

AT A GLANCE Businesses should be aware of the characteristics of the new client operating system, Windows 11. Windows 11 is built on the same foundation as Windows 10. Windows 10 users can easily upgrade to Windows 11 without any hassle. It updates what you already know and feel at ease with.  BENEFITS & REQUIREMENTS

WINDOWS 11 IS AVAILABLE Read More »

10 TYPES OF HACKERS EXPLAINED

As you know, the threat landscape is evolving rapidly. And much like any other evolving industry, job positions and roles are growing with them to meet the demands of the culture. It is easy to assume the role of a hacker when learning of cyber breaches or attacks. However, there are ten main types of

10 TYPES OF HACKERS EXPLAINED Read More »

PROPERLY HANDLING OLD DEVICES

WHY PROPER DESTRUCTION IS NECESSARY Technology is deeply embedded in our lives today, which arguably has pros and cons. Our devices store a lot of information, making going about our daily routines easy. However, some of that information is sensitive and personal. It is crucial to protect your sensitive information when disposing of, donating, reselling,

PROPERLY HANDLING OLD DEVICES Read More »