Blog

  • Cloud Security for Fintech Companies

    Cloud Security for Fintech Companies

    Financial technology (fintech) companies have gone from novelty to necessity in just a matter of years. Digital banking products, services, and usage exploded over the past decade, making customer’s lives easier and more convenient. But none of this happens without one key part of the fintech backbone: Cloud Technology.

    (more…)

  • Data Protection & Social Media: How GDPR Influences Today’s Social Media Platforms

    Data Protection & Social Media: How GDPR Influences Today’s Social Media Platforms

    Roughly 57% of the global population now have access to the internet. While being connected to the largest database in the world does bring a host of advantages, it does come at a price. Recent statistics revealed that about 53% of online users are currently more concerned about their online privacy compared to a year ago.

    (more…)

  • HITRUST: Common Security Framework

    HITRUST: Common Security Framework

    Roughly 38,000 Common Security Framework (CSF) assessments have been performed in the last three years. The Health Information Trust Alliance (HITRUST) is expecting a continuous demand for CSF certification thanks to the third-party assurance requirements from major health organizations. 

    (more…)

  • Active Consent Required for Storing Cookies in the EU

    Active Consent Required for Storing Cookies in the EU

    The Court of Justice of the European Union has ruled that website users must give active consent for cookies to be stored on their equipment. 

     

    The European Union’s Ruling

    The European Union Court Rules that Active Consent is Required for Storing Cookies.

    Big changes with regard to privacy are coming out of the EU. A press announcement from the Court of Justice of the European Union reveals that active consent is required by internet users for strong cookies to be placed on their equipment. The court ruled that active consent is not a pre-checked box that the user must deselect in order to refuse his or her consent.

    This ruling was the judgment in Case C-673/17, Bundesverband der Verbraucherzentralen und Verbraucherverbände ? Verbraucherzentrale Bundesverband eV v Planet49 GmbH.

    Cookies, of course, are files that websites store on the site user’s computer that the website provider can access when the user visits the website again. The purpose is to facilitate transactions or navigation of the site or to access information about the user’s behavior.

    Whether or not the information stored or accessed on the user’s equipment is personal data does not affect the decision.

    The Court stated that consent must be specific. Therefore, a user selecting a button to participate in, say, some sort of promotion does NOT mean that the user gave his or her consent to the storage of cookies.

    In addition, the Court decided that website service providers must inform users of the duration of the operation of cookies and whether or not third parties may have access to those cookies.

    Want to learn more about compliance with EU regulations like GDPR? Contact RSI Security today.

     

    [su_button url=”https://www.rsisecurity.com/compliance-advisory-services/gdpr/” target=”blank” style=”flat” size=”11″ center=”yes”]Speak with a GDPR compliance expert today![/su_button]

     

  • How to Prevent a Data Breach At a Cannabis Dispensary

    How to Prevent a Data Breach At a Cannabis Dispensary

    Recent numbers indicate that the global legal marijuana market is expected to reach $146.4 billion by the end of 2025. A survey by Grand View Research further added that medical marijuana will likely dominate the market a few years from now with a projected value of $66.3 billion.

    (more…)

  • What Is Security Incident Management?

    What Is Security Incident Management?

    Detecting security events quickly is one of the most important aspects of network security for most companies. Without a full-spectrum overview of all cyber activity, it can be nearly impossible to coordinate defenses and take down threats on the spot. Thankfully, companies can implement a security incident management plan to effectively handle these types of security events if they should arise.

    (more…)

  • Top Email Safety Tips & Best Practices

    Top Email Safety Tips & Best Practices

    Besides texting and social media, email is the communication hub for workers around the world. It enables more efficient communication and scheduling as well as improving organization. Yet, in the chaos of daily operations, it’s easy to overlook the security of email systems. Is your email vulnerable to security threats? Find out our top email safety tips with our comprehensive guide from RSI Security. 

    (more…)

  • Soc 2 Auditing Guide

    Soc 2 Auditing Guide

    Data is growing faster than it ever has before. But it is starting to become the biggest risk of every organization. The convenience and collaboration of using data stores in the cloud means that companies and hackers have more information and more access to it by design. 

    (more…)

  • How Can Managed IT Services Improve My Business?

    How Can Managed IT Services Improve My Business?

    Scaling your business quickly and effectively sometimes means that you need to turn to the professionals for assistance. In some cases, those professionals may specialize in financials or some type of business process. Other times, they focus on IT; which is exactly what managed IT services specialize in.

    (more…)

  • What Are the Different Types of Data Breaches?

    What Are the Different Types of Data Breaches?

    With 2020 here, it’s a good time to take stock of the cybersecurity environment and the lessons learned over the last year. According to Norton Security, there have been approximately four billion records compromised due to breaches in 2019. Attack tactics change and new vulnerabilities emerge as threat actors become more creative. There are several different types of data breaches that can affect your business. 

    Learn about your potential threats with our comprehensive guide. 

    (more…)