Category: Compliance Standards

Staying informed about all of the cyber security compliance standards is essential to keeping your company safe from hackers. Read on to learn about the various steps you can take to stay up to date with your industry’s compliance standards.

  • Privacy Policy Requirements For CCPA

    Privacy Policy Requirements For CCPA

    People want privacy when it comes to their personal information; however, sometimes they don’t realize how other companies use their information. Third party involvement and the use of online platforms increase the chances that consumer data will be sold or affected by a data breach. Consequently, California took action to empower consumers. Are you aware of the privacy policy requirements outlined by CCPA? Find out everything you need to know with our complete guide. 

    (more…)

  • A Detailed SOC 2 Compliance Checklist

    A Detailed SOC 2 Compliance Checklist

    Running a business is no easy task. Knowing whether you’re SOC 2 compliant or not is yet another thing on your already full plate of expense reports, hiring, marketing, and so much more. Using the following information will help clear any confusion so you can focus on the things you love about running your business.

    (more…)

  • How To Improve Cybersecurity In Financial Institutions

    How To Improve Cybersecurity In Financial Institutions

    To the cyber-criminal, the world is a list of digital targets. There are two primary methods for selecting those targets. Sometimes the adversaries cast a very large automated digital net, looking for easily exploitable weaknesses wherever they exist. When the system reports one, they decide if the target is worth their time and either pursue it or move on to the next. 

    The other is a far more dangerous method, in which the target is pre-selected because it is considered high-value. When hackers decided to go after Target Stores in 2013 the attack was complex, methodical, and persistent; eventually compromising over 40 million people’s card data and costing the company over $300 million.

    JP Morgan Chase suffered a breach in 2014 in which they reportedly compromised the financial and personal information of more than 76 million households and 7 million small businesses. The total cost of that incident is estimated to reach $1 billion!

    According to the IBM X-Force Threat Intelligence Index of 2019,  Finance and Insurance was the most frequently targeted industry in 2018 with 19% of the tracked attacks.

    (more…)

  • What Are The Penalties For Non-Compliance With CCPA?

    What Are The Penalties For Non-Compliance With CCPA?

    It wasn’t long ago when the EU’s General Data Protection Regulation (GDPR) went into effect and caused internet frenzy. The GDPR compelled people to care more about their personal information and how the information is being used by merchants and businesses with or without their consent. The policy actually pushed people to rethink how their internet activities could put them at risk, both financially and emotionally. 

    (more…)

  • Cyber Regulations For Banking In Europe vs. America 

    Cyber Regulations For Banking In Europe vs. America 

    Banking and financial systems often go unnoticed by the general public despite the fact that they support daily tasks. The US government even classifies financial systems under critical infrastructure. With both America and European countries relying heavily on technology, they have attempted to keep pace with new banking cybersecurity regulations. Ever wondered about the differences in cybersecurity regulations of banking in Europe vs. the US? Read on to find out now. 

    (more…)

  • Why BYOD is Bad For GDPR Compliance

    Why BYOD is Bad For GDPR Compliance

    More organizations than ever are looking for ways to cut overhead costs. Some are giving their employees the option to work remotely. Others are allowing them to use their personal devices (i.e. laptop, cell phone, etc.) to do their work on in place of a company-owned device.

    Although adopting a Bring Your Own Device (BYOD) policy might allow your company to scale and pivot as you grow, it also comes with tremendous risk from the security front. With more global organizations choose to adopt these BYOD, they invariably come in contact with General Data Protection Regulations (GDPR) that ensure the protection of user data that flows through a company’s network.  

    As such, it would be best to consider developing an ironclad, yet flexible BYOD strategy to ensure your organization doesn’t get hurt by potential GDPR compliance mishaps. Let’s run through the potential issues with BYOD and GDPR and point you in the right direction towards keeping your network data safe while decreasing your risk for getting hefty GDPR compliance fines.

    (more…)

  • CCPA Compliance: What You Need To Know

    CCPA Compliance: What You Need To Know

    The California Consumer Privacy Act (CCPA), widely regarded as the most extensive consumer privacy law in the United States, is set to be implemented on January 1, 2020. This landmark legislation on data protection is also considered as one of the toughest privacy-related laws in the world and poses a challenge to all businesses that collect personal information from consumers of California. 

    Similar to the General Data Protection Regulation (GDPR) that protects personal data of all European Union-based residents, the CCPA applies to all business entities regardless of their location.  It gives California residents control over how their personal data is handled. 

    As the date of CCPA implementation nears, this comprehensive guide to CCPA compliance will discuss everything you need to know about this historic privacy law. 

    (more…)

  • HITRUST Compliance: What You Need to Know

    HITRUST Compliance: What You Need to Know

    Rapid advances in medical technology are changing the healthcare industry for the better, but along with these technological advances, come adverse risks. Additionally, as doctors gather more data about their patients through medical devices connected to the internet, it is crucial that this data remains private. Robust data is important for the best care, just as robust security keeps that data private and secure.

    (more…)

  • CCPA vs. GDPR: What’s The Difference?

    CCPA vs. GDPR: What’s The Difference?

    Consumer data privacy has become a hot topic these days with various legislations enacted to promote and strengthen the privacy rights of consumers. There is a global trend of forcing companies to be more accountable and responsible when it comes to protecting consumer data.

    Consider the General Data Protection Regulation (GDPR), which was designed to protect the personal data of citizens of the European Union (EU).  It was passed into law in 2016 and took effect two years later.

    A couple of months after the GDPR took into effect, then California Governor Jerry Brown signed into law the California Consumer Privacy Act (CCPA) which will be implemented in 2020. The CPPA is widely considered one of the toughest consumer privacy laws in the United States.

    Because of the nature of these two legislations, a comparison between the GDPR and CCPA is unavoidable. This article will discuss briefly the two data privacy acts and enumerate the differences between GDPR and CCPA.

    (more…)

  • How to Become DFARS Compliant

    How to Become DFARS Compliant

    Years ago, governments defended themselves through espionage and military engagement. Today, there are still plenty of both. However, the form they’ve taken has changed drastically. Physical spies have given way to higher levels of digital reconnaissance. To defend against these threats, the U.S government created the Defense Federal Acquisition Regulation Supplement (DFARS) in 2017.

    Without getting too deep into how DFARS functions as an organization, and what countries need to be aware of DFARS compliance, here we’ll cover go through a complete step by step breakdown of how to become DFARS compliant.

    Naturally, a government mandate tasked with protecting sensitive information is going to be extremely comprehensive and (at times) exhausting. The NIST SP 800-171 is essentially all the inputs, outputs, regulations and requirements for any businesses looking to complete their DFARS compliant statement.

    (more…)