FAQs

FREQUENTLY ASKED QUESTIONS

FAQ

  • Top management, Strategic planners and key business users
  • Analysts
  • Line workers
  • Customers/Supplier

Public Cloud Service Providers (CSP) adopt a multi layered approach to security. Measures such as firewalls, intrusion detection and prevention, encryption, user authentication, malware and ransomware protection fortify the security of cloud.

Data leakage is an unauthorized transfer of data to the outside world. Data leakage occurs via email, optical media, laptops, and USB keys.

Data hygiene or data cleaning is the process of detecting and correcting corrupt or inaccurate records from a record set, table, or database and refers to identifying incomplete, incorrect, inaccurate, or irrelevant parts of the data and then replacing, modifying, or deleting the dirty or coarse data.