Word of the Day: Tech Definitions from WhatIs.com


November 26, 2018  5:44 PM

two-factor authentication (2FA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user must provide two authentication factors to verify identity. Continued…

Quote of the Day

“Multifactor authentication or 2FA options are cheaper and easier to integrate than ever before and their cost certainly outweighs the potential costs of data and identity theft, financial and reputation damage, and potential lawsuits.” – Michael Cobb

Learning Center
How were attackers able to bypass 2FA in a Reddit breach?
Reddit was quite open after it experienced a breach by attackers who bypassed 2FA. Learn how attackers were able to bypass controls to cause the Reddit breach and how other sites can prevent this kind of attack with Judith Myerson.

How can U2F authentication end phishing attacks?
Google implemented U2F authentication and physical security keys to defend against phishing attacks. Learn why Google chose U2F over OTP and whether or not it’s an effective method.

Enterprises should reconsider SMS-based 2FA use after breach
Reddit recently revealed a data breach that was caused by threat actors intercepting SMS-based 2FA codes. Discover what this means for users and why enterprises should re-evaluate their use of SMS for authentication.

Reddit breach sparks debate over SMS 2FA
A Reddit breach was discovered to be due to an attacker compromising the SMS two-factor authentication used by employees, sparking a debate over using that 2FA method.

Risk & Repeat: Inside the Facebook 2FA fail
This Risk & Repeat podcast examines the Facebook 2FA controversy where the company admitted to using mobile numbers for advertising purposes and what that means for Facebook’s reputation and 2FA adoption in general.

Trending Terms
authentication factor
single-factor authentication
security token
multifactor authentication
out-of-band authentication
three-factor authentication

Quiz Yourself
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer

November 20, 2018  6:53 PM

PHI breach

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A PHI breach is the unauthorized access, use or disclosure of protected health information (PHI) from an electronic health record (EHR). Continued…

Quote of the Day

“A new surge of networked medical devices and wearable gadgets present possibilities for exposure to serious security breaches in healthcare, and many hospitals are unprepared to tackle the next endpoint challenge.” – Nicole Lewis

Learning Center
How data duplication in healthcare is diagnosed
Despite the proliferation of electronic health record systems, data duplication still plagues hospitals and can cost a large hospital around $1 million to fix. Find out how EHRs and other methods can help address duplication of patient data.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

To get secure cloud storage in healthcare, gauge risks first
To have secure cloud storage in healthcare, cybersecurity experts say conducting a risk assessment is a necessary step before moving to the cloud, while building a relationship between the organization and cloud provider is vital for maintaining security.

HIPAA requirements steer data protection in healthcare
HIPAA requirements are not specific about the technology to achieve data protection, but HIPAA’s weight in disaster recovery still remains considerable.

Healthcare cybersecurity must complement HIPAA compliance
A comprehensive healthcare cybersecurity plan should include network monitoring, patient record access tracking, employee training and HIPAA compliance.

Trending Terms
electronic health record
medical identity theft
ePHI
data breach response plan
full disk encryption
security awareness training
principle of least privilege

Quiz Yourself
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive
Answer


November 19, 2018  5:36 PM

cloud service provider

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud service provider (CSP) is a company that offers infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS) to other businesses or individuals. Continued…

Quote of the Day

“While the cloud itself has relatively low costs initially, moving cloud workloads and dealing with multiple cloud providers can be tricky.” – John Edwards

Learning Center
>How to handle VDI in the cloud with multiple vendors
It is common for organizations deploying VDI in the cloud to deal with multiple vendors. See why this can be a problem and what options IT might have to migrate everything to a single cloud.

Public cloud workload success requires IT leadership
Public cloud workload success rates improve when IT departments adapt to the reality that the business side of an organization can circumvent IT to procure and provision cloud resources themselves.

Two cloud backup problems that organizations need to consider
Possible cloud backup problems — such as cost and bandwidth impact — should not be underestimated. Within those areas, there are several important considerations for organizations.

Evaluate public IaaS options based on these key features
Before you go all in with a public IaaS provider, there is a lot to consider, ranging from compute options to support for emerging technology, like AI.

Cost management the next big issue in multi-cloud computing
Multi-cloud computing is here, but enterprises struggle to manage their resources and costs across cloud boundaries. There are tools that can help, but they are not a cure-all yet.

Trending Terms
Infrastructure as a Service
Software as a Service
Cloud Security Alliance
cloud storage SLA
Platform as a Service
cloud provider API

Quiz Yourself
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating
Answer


November 16, 2018  5:39 PM

social engineering

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain. Continued…

Quote of the Day

“The best defense against attackers using social engineering scams is and will always be awareness.” – Reda Chouffani

Learning Center
Social engineering scams must be on hospitals’ radars
Social engineering scams targeting the healthcare industry are becoming increasingly common. Fortunately, in addition to security software, there are some practical tips that can help combat these types of attacks.

Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.

Social engineering techniques are becoming harder to stop, experts say
Social engineering techniques have evolved as more personal and corporate information is shared on the Web, leaving enterprise to adopt new training methods to keep data safe.

What is behind the growing trend of BEC attacks?
Business email compromise attacks do not require the use of a malicious payload or URL, making them popular among cybercriminals. Learn more about how to recognize possible BEC attacks.

Phishing threats still dwarf vulnerabilities, zero-days
Email security vendor Proofpoint released its Human Factor 2018 report, which details how phishing threats are evolving and still beating enterprise defenses.

Trending Terms
spear phishing
watering hole attack
scareware
tailgating
penetration testing
security awareness training
remote access Trojan

Quiz Yourself
____ can you trust? Social engineering tactics are so sneaky and phishing attempts are so sophisticated that you’re afraid to click a link in an email from your boss or your bank.
a. Who
b. Whom
Answer


November 15, 2018  5:33 PM

customer experience management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization throughout the customer lifecycle. Continued…

Quote of the Day

“From a CEM standpoint, it’s not enough to understand a customer at the tail end when they already made a purchase. You need to understand the full experience.” – Cesar Coba

Learning Center
Improving customer experience strategy with digital tweaks vs. transformation
Don’t worry about endless lists of technologies to improve customer experience strategy. Read about companies that figured out how to choose the CEM technology that worked best for their customers — and reaped the benefits.

Invest in people for better customer experience in marketing
In an effort to improve customer experience in marketing, research firms IDC and Gartner found that organizations are increasingly hiring staff with designated CX responsibilities.

Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.

Open data, customer experience AI the focus for retail automation
Like it or not, customer experience AI will infuse sales and marketing for years to come. At Ignite 2018, SAP, Adobe and Microsoft band together to standardize data models in preparation.

The role and responsibilities of a customer relationship manager
What exactly does a CRM manager do? Is the role of the CRM manager different from a customer relationship manager? Get the answers here.

Trending Terms
customer life cycle
360-degree customer view
customer journey map
brand personality
customer segmentation
customer analytics

Quiz Yourself
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
a. minds
b. mind
Answer


November 14, 2018  8:51 PM

process mining software

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Process mining software is a type of program that analyzes data in enterprise application event logs in order to learn how business processes are actually working. Continued…

Quote of the Day

“Process mining is all about automatically discovering the as-is business process from the data that an organization generates — it’s like an X-ray or MRI machine for your business.” – Alexander Rinke

Learning Center
Celonis’ process mining software helps manufacturer improve efficiency
Process mining software from Celonis helped manufacturing company Chart Industries understand its accounts payable and accounts receivable processes, leading to improved process efficiency. The company began a digital transformation by identifying candidates for robotic process automation.

Process mining software provides an inside view of SAP systems
Process mining software helps Vodafone get an inside look at its SAP business processes to improve operational efficiency and prepare for an S/4HANA upgrade.

What software features are key for process manufacturing ERP?
One expert shares the keys to finding the right process manufacturing ERP software features and why industry identification is critical.

Siemens uses process mining software to improve manufacturing visibility
Siemens implemented process mining software to improve visibility into its manufacturing systems and is seeing a big payoff.

Which platform for machine learning is right for your enterprise?
Does your company need a platform for machine learning, which helps turn data into insights, informing outcomes? The big names in tech, like Google, Microsoft, Amazon and others, offer machine learning platforms. Learn more about each and which is best for your business.

Trending Terms
business process reengineering
business process management
audit log
data visualization
supply chain management
business process discovery
Sarbanes-Oxley Act

Quiz Yourself
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
A. continual
B. continuous
Answer


November 13, 2018  9:03 PM

emotional intelligence (EI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Emotional intelligence (EI) is the area of cognitive ability that facilitates interpersonal behavior. Continued…

Quote of the Day

“A bot may be good enough for customer service interactions, but more personal situations demand a higher level of emotional intelligence and the ability to respond naturally to unexpected prompts.” – Ed Burns

Learning Center
Digital voice assistants seek their place in healthcare
Digital voice assistants are being adopted for consumer use, but have yet to find a solid footing in healthcare. Microsoft and Google are hoping to change that by adding new capabilities to their tools.

Emotional intelligence in the workplace makes a difference
If you want to make an organization agile, master emotional intelligence in the workplace. Companywide change starts with empathy, not the newest tool set or acronym.

AI in healthcare spurs advanced uses such as emotional intelligence
AI in healthcare is spawning advanced applications, such as using data about emotion and socioeconomic conditions to personalize care and post-treatment.

Customer support chatbots set to transform service functions
Customer support chatbots are starting to penetrate customer service teams in enterprises, promising to streamline operations and improve efficiency.

Finding internal data science talent: The right stuff
Fierce competition for data science talent means that CIOs must look internally for people with the right stuff. At the Global Artificial Intelligence Conference in Boston last week, AI experts shared tips on what attributes to look for.

Trending Terms
soft skills
affective computing
Plutchik’s Wheel of Emotions
emotional analytics
ambient intelligence
leadership traits

Quiz Yourself
Although she was not __________________, the CEO soon learned to cultivate the soft skills that made her an effective leader.
a. to the manner born
b. to the manor born
Answer


November 12, 2018  6:22 PM

center of excellence (CoE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A center of excellence (CoE) is a team of skilled knowledge workers whose mission is to provide the organization they work for with best practices around a particular area of interest. Continued…

Quote of the Day

“The center of excellence is more than just an idea: It should have well-defined roles, responsibilities, authority and supporting business processes.” – Eric Kimberling

Learning Center
Data literacy training offerings key to BI vendors
Data literacy training, or training on how to understand and use data, is something that both BI vendors Qlik and Tableau agree is important in today’s world.

Artificial intelligence center of excellence emerges as best practice
The dust is not close to settling on how to apply AI in the enterprise. One way for enterprises to formulate an AI strategy is to establish an artificial intelligence center of excellence. But CIOs should be careful to tailor the CoE to the business appetite and need for AI.

Maximize the ROI of ERP projects with an ERP center of excellence
Learn the benefits of establishing an ERP center of excellence from a consultant who helps organizations get the most from their ERP projects.

RPA trends: Adoption at scale calls for governance, change management
The top RPA trends in automation deployment include a need for governance, change management and business-technology cooperation. Find out more in our overview of the recent UiPath Forward robotic process automation event.

RPA tools lead to better customer service: Three case studies
RPA tools promise to automate repetitive, manual tasks to free up workers to focus on bigger and better business goals. Here’s how three companies and their workers fared after deploying robotic process automation.

Trending Terms
big data analytics
operational excellence
Campbell’s Law
key performance indicators
continuous improvement
skunk works project
Six Sigma

Quiz Yourself
An executive can _______ a business intelligence dashboard to get an up-to-the moment snapshot of how some element of the business is performing.
a. use
b. utilize
Answer


November 9, 2018  6:14 PM

rugged DevOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Rugged DevOps is an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle. Continued…

Quote of the Day

“It’s possible to develop code that’s even more secure than before the move to DevOps if you approach DevOps and security properly.” – Johna Till Johnson

Learning Center
Best practices for DevOps compliance and reusability
To get to a compliant model-driven approach, organizations should follow these best practices for DevOps. Your DevOps model should be compliant an reusable in order to scale.

Help ops to begin a DevOps implementation the right way
Everyone knows a successful DevOps implementation can be tricky. Stephen Bigelow outlines how ops pros newly introduced to DevOps should proceed.

The secret to DevOps test automation? Pick your battles
DevOps test automation is perhaps the biggest sticking point in any company engaged on the path. But an Australian-based app maker may have the right idea. Here’s how Airtasker came to understand test automation is not all or nothing and why this will matter to your organization.

DevOps security takes on the dark side of digital transformation
Immature digital transformation efforts expose the global economy to the risk of security breaches, with serious impacts that rival the 2008 financial crisis. Enterprise DevOps security efforts might reduce that risk, but must overcome skills shortages and industry inertia.

DevOps security requires new mindset and tools for visibility, automation
DevOps security has to be as close to continuous as possible. Early DevOpsSec adopters share tips on how to defend the cloud’s continuous improvement model.

Trending Terms
waterfall model
DevOps engineer
continuous software development
pen testing
DevOps 2.0
DevOps as a service

Quiz Yourself
Once the business owner saw the benefits of attending an ______________ improved.
A. Agile retrospective, his participation
B. Agile retrospective his participation
Answer


November 8, 2018  6:11 PM

SWOT analysis

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

SWOT analysis (strengths, weaknesses, opportunities and threats analysis) is a brainstorming exercise for helping to identify what internal and external factors will impact the ability of a project, product, place or person to be successful. Continued…

Quote of the Day

“Successful completion of the strategic planning process means the newly implemented strategies must be periodically evaluated and updated as needed.” – Paul Kirvan

Learning Center
Your business continuity process can enhance strategic planning
Learn how activities performed in your business continuity process can foster long-term strategic planning. We note the five areas where a business impact analysis can add value.

What-if business planning simulation at its predictive best
As analytics gets more advanced, the ease with which large-scale what-if planning simulation in business can be implemented is increasing.

Enterprise digital transformation: How CIOs can drive business growth
Stephen Hamrick, vice president of product management for SAP Jam, explains how enterprise digital transformation is changing the role of the CIO in business process development.

CIO playbook for 2018: Leading analysts break down the trends
What’s in the 2018 CIO playbook? Ten leading analysts lay out the top issues: Read what they say about cloud consolidation, networks, API management and more.

CMS analytics arms businesses with a strategic planning edge
CMS analytics helps large enterprises get business value from unstructured data in their networks, delivering content to the people who need it.

Trending Terms
competitive advantage
strategic management
strategic planning
organizational goals
Porter’s Five Forces
crossfunctional

Quiz Yourself
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
a. awhile
b. a while
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: