Browse Definitions :
  • November 23, 2009 23 Nov'09

    Fast Guide to Pandemic Planning

    Pandemic planning requires an organization to anticipate a situation where a large part of the workforce is out sick.  Continue Reading

  • November 17, 2009 17 Nov'09

    backscatter spam

    Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender...  Continue Reading

  • November 16, 2009 16 Nov'09

    Vouch by Reference (VBR)

    Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info.  Continue Reading

  • November 05, 2009 05 Nov'09

    paradox

    A paradox is a statement or concept that contains conflicting ideas.  Continue Reading

  • November 03, 2009 03 Nov'09

    PayPhrase

    Amazon's PayPhrase is an Internet point-of-sale (POS) shortcut that allows Amazon customers to use their Amazon payment and shipping authorization credentials while shopping at third-party partner sites.  Continue Reading

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems -- including hardware, software and data -- from cyberattacks.

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close