18,259 Results for:practices

  • Sort by: 

10 PCI DSS best practices to weigh as new standard rolls out

By Paul Kirvan 27 Sep 2022

PCI's Security Standards Council revamped the requirements governing how organizations store payment card information. Companies need to act fast to ensure they are in compliance. Read More

Hybrid cloud connectivity best practices

24 Feb 2022

No two hybrid cloud architectures are the same. Each implementation depends upon a business' specific needs and budget. Still, these practices can set up hybrid cloud connectivity without breaking the bank. In this... Read More

Top 10 enterprise data security best practices

By Charles Kolodgy 22 Jul 2022

To protect your organization's data and prevent its misuse, incorporate these 10 data security best practices into your enterprise data security strategy. Read More

Podcast: Sama responds to AI data labeling criticism

By Esther Ajao, Shaun Sutner 29 Jan 2024

The data annotation and labeling vendor, which has faced criticism for its practices in Africa despite its social good mission, is out with a new platform to reduce model failure. Read More

Best practices and pitfalls of the data pipeline process

By George Lawton 09 May 2022

Developing an effective data pipeline process is a key step for organizations to manage data sources, flow and quality. A data pipeline also ensures approved data access. Read More

Best practices for initiating chatbot-to-human handoff

By Fancy Mills, Jonathan Bordoli 03 May 2022

Contact centers perform a balancing act between AI and human agents. Support teams must train bots on chatbot-to-human handoffs and design AI aware of customer frustration. Read More

7 data quality best practices to improve data performance

By George Lawton 09 Sep 2022

Data quality is essential to operate a successful data pipeline and enable data-driven decision-making. These seven data quality best practices can help improve performance. Read More

Awareness of EHR SDOH Documentation Capabilities Varies by Practice Type

By Hannah Nelson 08 Sep 2022

Community health center physicians were more likely to be aware of EHR capabilities for social determinants of health (SDOH) documentation than other providers. Read More

Phishing attacks benefiting from shady SEO practices

By Shaun Nichols 28 Apr 2022

Cybercriminals running phishing operations are now making use of SEO specialists that break Google's rules to get themselves placed above legitimate search results to lure victims. Read More

Best practices for creating an insider threat program

By Ashwin Krishnan 27 Apr 2022

A thorough insider threat program includes plan preparation, threat assessment, and plan review and renewal. Learn how to implement this three-step model to protect your company. Read More