Is your business ready for the California Consumer Privacy Act (CCPA)? If you handle consumers’ personal information, resolve to get in compliance before it’s too late. Starting January 1, 2020 consumers are going to be entitled to protection from companies selling personal information to other third-party companies without their knowledge. They are also going to be entitled to relief from wrongful sharing of their personal information, whether or not it was leaked on purpose. Read on to find out what these new protections are and what you can do about them to reduce your liability.
Blog
-

Are Private Schools At a Higher Risk For Cyber Security Attacks?
Educational institutions have been a target for hackers for a variety of reasons in recent years. For one, most public school systems are underfunded and allocate an extremely small percentage of their budgets towards cybersecurity. But what about private schools?
-

The Dangers of Data Breaches for Your Business
A data breach can happen when you least expect it. The impact of security breaches on business can amount to millions (or potentially billions of dollars if your organization creates that much revenue) and leave its reputation in shambles amongst industry pundits and customers alike. This is why it’s best to understand what the potential consequences of data breach are and how your business can bounce back from one if caught between a hacker and a hard place.
-

Should My Company Become A HITRUST Assessor?
Companies that broadly occupy the security space might consider a new service they could offer at the intersection of healthcare and cybersecurity: becoming a HITRUST assessor.
All kinds of personal data already lives online, but now we’re faced with medical categories of data being usefully stored there as well. And the cynics and realists alike know that anything stored online is fundamentally vulnerable to cyber attacks
-

How To Prepare For A HITRUST Audit ?
Healthcare organizations pursue HITRUST certification because they want to demonstrate productive forward motion on cybersecurity mindfulness. A mark of HITRUST compliance means that a business has taken steps to interrogate its technological infrastructure for flaws and potential improvements.
-

The Importance of an Incident Response Plan
Companies across all sectors realize the importance of using technology to both attract and retain customers. However, with technological integration, new cybersecurity threats are emerging every day endangering mobile messaging apps, online banking, and basically every industry. Consequently, it’s important that enterprises establish an incident response plan to deal with minor and major security threats. Despite these threats, a 2018 IBM report found that 77 percent of respondents did not have a consistent incident response plan to deploy in the event of a security breach!
-

Challenges of Managing Personally Identifiable Information
It’s difficult in the current technological environment to determine what falls under private or personal information, especially considering how many social media platforms exist. People post a plethora of information about themselves causing the concept of privacy to become skewed. All of this information provides companies with a window into the consumers’ minds and consequently their wallets. But, with information collection comes the responsibility to protect personal data from malicious individuals.
-

Everything You Need to Know About Service Organization Control Reporting
System and Organization Controls (SOC) reports are an essential method for service organizations to build trust and confidence in software and service delivery processes and controls that protect information and systems against risks, including unauthorized access and damage to systems. The SOC report framework, previously referred to as Service Organization Controls, was developed by the American Institute of Certified Public Accounts (AICPA) to be managed by independent third party certified public accountants (CPAs).
-

Cyber Hygiene: A Complete Guide
For any business that handles sensitive data, keeping your IT systems functioning properly can be a matter of life or death. Just as a surgeon wouldn’t operate without clean hands and equipment, businesses shouldn’t collect, process, or store data if they’re not practicing proper cyber hygiene.
-

Managed IT Services vs SAAS: What’s the Difference?
In recent years, swift technological developments have changed the business and information technology domain. For non-technical business owners who are struggling to stay up-to-date with the latest technological advances, this is both good news and bad news. There are two solutions that businesses can outsource to save themselves from confusion. These are managed services and software as a service (SaaS) model.
