The Art of Service, Standard Requirements Self AssessmentsTAOS logo
  • Store
    • TOOLKITS
  • Subscriptions
    • Membership
    • Member Login
  • Services
    • E-Learning
    • Consultancy
  • About us
    • Articles
    • Reviews
  • Log in

panels

Articles

Incident Management: What defines a critical incident?

The objective of incident management is to restore operations as soon as possible, whereas the objective of problem management is to minimize the adverse impact of incidents and problems on the organization caused by errors within the IT infrastructure and prevent reoccurrence of incidents related to these errors, its main Read more…

By The Art of Service, 8 months ago
Articles

Data Masking: What other changes will you see in the database after encryption?

There was no encryption or any sort of database feature enabled, and the behavior was eerily similar to some sort of data masking feature having been enabled, static data masking is a new feature that allows you to create a cloned copy of your database and replace sensitive data with Read more…

By The Art of Service, 11 months ago
Articles

Data Masking: How do you ensure that personally identifiable information never leaves your organization?

Anonymization of personal data is that personal data can never be associated with a particular or identifiable real person, even if personal data is paired with other data, another term that is used to refer to data masking is data obfuscation and is the process through which one can hide Read more…

By The Art of Service, 11 months ago
Articles

Data Masking: What sensitive data shall be protected?

Where appropriate, it is also good practice to inform customers of the security measures in place to protect the data during the sharing process and the safe disposal of the data after use, efficient management of data used for testing is essential to maximizing return on investment and supplementing the Read more…

By The Art of Service, 11 months ago
Articles

Data Masking: Do you apply special measures for protection of personal data?

Once data is leaked, there is effectively no way for your organization to control its spread and use, sharing data with other organizations can help to recognize the gaps in your data set, making for a more resilient and more trustworthy data set. To begin with, either apply encryption or Read more…

By The Art of Service, 11 months ago

Posts navigation

1 2 Next
Recent Posts
  • Disaster Recovery Business Continuity
  • IBM InfoSphere DataStage
  • IBM MQ
  • Open Banking
  • Virtual Desktop Infrastructure
Archives
TAOS logo

Our office is located at 22B/302 South Pine Road Brendale, Qld 4500 Australia

(AU)  07 32052596

Email: [email protected]

 

Facebook
Twitter
YouTube
LinkedIn
  • About us
  • What We Do
  • Membership
  • FAQ
  • Shipping & Returns
  • Contact Us
  • Sitemap
  • Support

  • Self-Assessment Licensing
  • End User License Agreement
  • Privacy Policy
© 2020 - The Art of Service. All Rights Reserved