Archives
Categories
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Rant
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Surface
- Windows Virtual Desktop (WVD)
- Announcements
- Apple
- Applications
- Arctic Wolf Networks
- Azure
- Backup and Disaster Recovery
- Business Continuity
- BYOD
- Cloud Computing
- Compliance
- Coronavirus
- COVID-19
- Cryptocurrency
- Customer Service
- Cybersecurity
- DFARS
- Dynamics NAV Hosting
- Firewall-as-a-Service
- HIPAA
- iOS
- IT Best Practices
- IT Expenses
- IT Outsourcing
- IT Security
- Legal Vertical
- Linux
- Managed IT Services
- Medical, EMR, EHR
- Microsoft Azure
- Microsoft Power Platform
- Mobile
- Mobile Computing
- New Jersey
- New York City (NYC)
- Office 365
- PCI
- Rancho Cucamonga Location
- Rant
- Regulatory Compliance
- SharePoint
- SiteLink
- Small Business
- SOCaaS
- Software Development
- Sort of Technical
- Tools/Utilities
- Troubleshooting
- Ubuntu
- Uncategorized
- Very Technical
- Virtualization
- Windows Surface
- Windows Virtual Desktop (WVD)









Regulatory Compliance
A Discussion on Information Technology (IT) Policies and Why You Need Them
Posted on November 14th, 2018 in Compliance, Regulatory ComplianceOn October 22nd, 2018 I held a teleconference to discuss the topic of Information Technology (IT) Policies with data privacy expert, Michael Feldman, Esq. and Cybersecurity expert and consultant, Jeff Miller. The complete video is published on YouTube. Below, we are also providing a transcript of the entire call. Daniel: All right, guys, welcome back for our second episode here….(read more).
Comments (0)