RenovoData - The Data Protection Blog

about renovodata

Data Security

Best Practices for Preventing Email Cyberthreats (3PL Perspectives November 2018)

Published November 08, 2018 by

bestRenovoData was featured in the 3PL Perspectives publication (November Edition) with this article, which is part THREE of the three-part series that addresses cybersecurity.  This final article reaches to a higher level of safeguarding, one that stems from designated leadership and overall preparedness.  3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. Read More.


 


 

Digital Transformation Offers Opportunities...

Published October 23, 2018 by

Digital TransformationThe term digital transformation represents today’s continuous proliferation of digital technologies, and it also points to the speed with which they are being integrated into every area of activity. On a global scale, this steady acceleration is remaking human society, strongly affecting the ways we do business. Read More.


 


 

How Users Can Identify Email Cyberthreats (3PL Perspectives October 2018)

Published September 25, 2018 by

cyber thRenovoData was again featured in the  3PL Perspectives publication (October Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele Vayle, is part TWO of a three-part series that addresses cybersecurity.  Read More.


 


 

What Users Should Know About Email Cyberthreats (3PL Perspectives September 2018)

Published September 05, 2018 by

email cyber securityRenovoData was featured in the 3PL Perspectives publication (September Edition). 3PL Perspectives is a third-party logistics magazine provided by the Transportation Intermediaries Association. This article, written by RenovoData's Michele Vayle, is part one of a three -part series that addresses cybersecurity.  Read more.


 


 

Blockchain Brings New Capabilities, but Proceed with Caution (Logistics Journal June 2018)

Published May 31, 2018 by

Block Chain ArticleRenovoData were featured in the Logistic Journal's June 2018 edition. The article includes a series of facts about how blockchain works and what makes it so widely used, but most importantly it shared information on potential problems of the system and how to protect your company.  Read more.


 


 

Cyber Security TIA Panel, "Don’t be the next headline"

Published April 26, 2018 by

TIA Expert Panel 2017The TIA (Transportation Intermediaries Association) Conference and Tradeshow always has incredible education series. This year, once again, we were asked to join an  industry panel of experts, including our own Chuck Cook (CEO of RenovoData), plus Ben Barnes, Chief Information Security Officer at McLeod Software, Alex Hamerstone, Practice lead for Governance, Risk & Compliance at TRUSTEDSEC and moderator Brian Evans, President & CEO, L&L Freight Services, Inc.. Read more and view the video.


 


 

Blockchain makes big promises – and raises big questions

Published January 23, 2018 by

blockchainAre you aware of the challenges of Blockchain technology, in addition to how it affects your data and business continuity?Learn More...


 


 

Cyber Threats are Multiplying Rapidly, Protect your data with these three steps

Published November 30, 2017 by

logistics journal november 2017The article provides expert-level detail on cyber threats and provides three steps that can help to protect your data..  Read more...


 


 

The Internet of Things Introduces Big Possibilities for 3PLs and Trucking Companies (Logistics Journal Oct 2017)

Published November 09, 2017 by

logistics journal october 2017The article provides expert-level detail on guiding 3PL and Trucking Companies through the importance of having a solid plan and helping them to prepare for a disaster.  Read more...


 


 

Cloudy Thinking about Data Backup - Article Featured in the Logistics Journal, June 2017

Published July 05, 2017 by

Logistics Journal front cover April 2017Last month (June 2017), RenovoData were once again featured in The Logistics Journal. The article provides expert-level detail on helping 3PL and Trucking Companies to get a grasp on the realities of data backup and to avoid the traps of common misconceptions that often circulate. Learn more.


 


 

RenovoData joins a panel of experts at the TIA 2017 Conference

Published April 21, 2017 by

TIA Expert Panel 2017The TIA (Transportation Intermediaries Association) Conference and Tradeshow always has incredible education series. This year we were able to not only attend the conference but our CEO, Chuck Cook, RenovoData joined an  industry panel of experts, including Ben Barnes, IT Director at McLeod Software, Chris Hauser, Vice President, Travelers Risk Control, Cyber Program and moderator Bill Cassidy, Senior Editor, Trucking & Domestic Transport. Read more and view the video.


 


 

Network Security for 3PL and Trucking Companies - as Featured in the Logistics Journal, November 2016

Published January 10, 2017 by

RenovoData network securityarticleIn November 2016, RenovoData were once again featured in the leading publication from the Transport Intermediaries Association, The Logistics Journal.  The article, authored by our own Data Protection Expert, Chuck Cook, provides expert-level detail on Network Security (Simple Concept, Complex Reality) including security-risk lingo (vulnerabilities, threats, breaches, etc), planning a security program, reduction of human error, what to protect, knowing your enemies, and their weapons!  And, of course the importance and value of testing.  Learn more and read the full article


 


 

The security onion - A single entity with many layers.

Published October 27, 2016 by

security onionEffective security demands the strongest possible protective measures, encompassing every aspect of the network. Although technical components are separate items and the organization itself comprises various aspects of the security process, all are bound together to form a whole, like the layers of an onion. Both technical and human components can be at risk. Only by implementing universal security policies and procedures can the entire system be safeguarded.  Learn More.


 


 

Looking for older posts? View our Archives