In 2018, the Facebook-Cambridge Analytica scandal came to light, raising serious questions about how consumer data was being used. Later that year, California enacted the Care About California’s Privacy Act (CCPA) requiring more data transparency and giving consumers more privacy rights. The Act grants California residents greater control over how their data is collected, stored, shared, or sold. Is your business complying with the new CCPA regulations?
Blog
-

Factor Analysis of Information Risk (FAIR) Training Best Practices
In FAIR risk management, numbers don’t lie. A quantitative approach in solving potential problems uses precision and structure to its advantages. Information risk may be a complicated subject to tackle, but with the help of FAIR, this can be understood in business or financial terms.
-

Advanced User Guide to Incident Response Methodology
What happens in the moments proceeding a cybersecurity incident will greatly impact the amount of damage your organization sustains. Your incident response methodology dictates how quickly and efficiently your IT and security teams manage a security breach.
-

Monthly Webinar Recap – Why You Need To Perform A Cyber Risk Assessment
You might think that you have adequate cybersecurity protocols in place and your practices are current to meet all potential threats, but this could be a false sense of security. In this article, we’ll recap our monthly webinar and explain why you need to perform a cyber risk assessment.
-

Why Fintech Companies Need a Cybersecurity Partner
Fintech is the wild west frontier of loose regulations and killer app emerging tech and you need a sheriff. The fintech industry is seeing explosive growth, with more of our daily activities migrating to the digital space, fintech security solutions are quickly becoming a must-have for any fintech businesses.
-

HOW TO OBTAIN A PIPEDA COMPLIANCE CERTIFICATE
Undoubtedly, technology has connected the world beyond barriers of geography and location. Personal information can now be collected for every action taken on the internet and it seems like one can’t fully maximize the potentials of the internet if their information is not taken. A PIPEDA compliance certificate tells your clients that your business is able to keep their personal information secure.
-

Top PIPEDA Rules That Apply to U.S. Companies
In 2000, Canada enacted its data protection act designed to protect consumers’ identifiable information. Since it was passed into law, the Personal Information Protection and Electronic Documents Act (PIPEDA) has expanded to cover most private-sector industries. This means if you want to continue doing business in Canada you need to know the top PIPEDA rules that apply to U.S. companies.
-

Beginner’s PIPEDA Requirement Checklist
Does your company do business in Canada? If so, and it includes transmitting, storing, and using personally protected information (PII), the organization must meet the Personal Information Protection and Electronic Documents Act (PIPEDA) requirements. This is where a PIPEDA compliance checklist will come in handy.
-

What Should be in Your Vendor Management Cybersecurity Policy?
Third-party vendor management policy is perhaps the most underrated component to a mature cybersecurity strategy. Last year, Becker’s Hospital IT reported startling statistics:
-

Why CIS Controls Are Critical for Effective Cyber Defense
No matter how robust a company’s information technology (IT) resources and protections are, they’re always subject to risk. Even the most proactive companies struggle to keep pace with the evolution of cybercriminals’ methods and vectors of attack. The Center for Internet Security (CIS) has developed a framework to help reduce these risks; the CIS critical security controls for effective cyber defense are a key area of security for all business.
