Many different auditing processes exist, and companies increasingly face the challenge of choosing which type to conduct. Consumers and business partners demand data protection, so it is vital that companies…
-
-
In 2015 a man named Alastair Mactaggart had a conversation with a friend of his, a Google engineer, about the amount of data Google had on people. The more he…
-
It is a landmark regulation that is seen to have ripple effects on the cybersecurity practices of financial institutions not only in the United States but also worldwide. The New…
-
Today’s Mobile Environment: If it is true that time flies, then it must be true that technology rockets. Today, the race for faster, smarter and more sophisticated technology dominates headlines…
-
How to Choose the Best Third-party Risk Management Certification Provider
by RSI Securityby RSI SecurityIn today’s business world, effective and efficient risk management is considered a major factor in the overall success of organizations. Businesses are investing heavily in third-party risk management programs to…
-
Security risks come in all shapes and sizes and affect all manner of companies. For small businesses, like a local computer repair shop, security is important, but requires only a…
-
Information security policy is an extremely important topic of discussion that is often not discussed at all due to a number of reasons. Organizations often find that after they create…
-
-
What is the DFARS Checklist? DFARS stands for Defense Federal Acquisition Regulation Supplement. Despite its best intentions, the acronym doesn’t give the layman much of a hint to its actual…
-
Understanding and managing the risk that third-party service providers or suppliers pose to your operations should be an essential component of any comprehensive cybersecurity risk program. The risk that third-party…