Blog

  • CCPA vs. GDPR: What’s The Difference?

    CCPA vs. GDPR: What’s The Difference?

    Consumer data privacy has become a hot topic these days with various legislations enacted to promote and strengthen the privacy rights of consumers. There is a global trend of forcing companies to be more accountable and responsible when it comes to protecting consumer data.

    Consider the General Data Protection Regulation (GDPR), which was designed to protect the personal data of citizens of the European Union (EU).  It was passed into law in 2016 and took effect two years later.

    A couple of months after the GDPR took into effect, then California Governor Jerry Brown signed into law the California Consumer Privacy Act (CCPA) which will be implemented in 2020. The CPPA is widely considered one of the toughest consumer privacy laws in the United States.

    Because of the nature of these two legislations, a comparison between the GDPR and CCPA is unavoidable. This article will discuss briefly the two data privacy acts and enumerate the differences between GDPR and CCPA.

    (more…)

  • 5 Reasons You Need SaaS Data Protection

    5 Reasons You Need SaaS Data Protection

    In today’s digital world computing power goes a long way in deciding a business’s success. In order to be profitable, a company must be dynamic, malleable and light on their feet. The type of software you choose will decide many of those characteristics. Software-as-a-Service (SaaS) or cloud computing offers companies fast, reliable and affordable software infrastructure that more and more companies are utilizing. However, with great power comes great responsibility. Without proper SaaS data protection, your company runs the risk of encountering extremely damaging security breaches. What is your content level security in cloud computing and do you need SaaS data protection? Read on to find out.

    (more…)

  • The Software-as-a-Service Framework: What You Need To Know

    The Software-as-a-Service Framework: What You Need To Know

    According to recent research, the global Software-as-a-Service (SaaS) market is expected to reach upwards of $95 billion by 2022. From accounting and finance tools to customer service and marketing, businesses of all shapes and sizes are leveraging SaaS more than ever to increase productivity, efficiency, and collaboration.

    And while most people are familiar with SaaS on a surface level as technology tools that can be used from any device in any location, there are actually a variety of reasons that make the SaaS model so attractive for organizations across all industries. This software as a service framework is superior to the traditional on-premise model due to the flexibility, scalability, pricing model, and easy integration with other systems and apps.

    In case you’re not currently aware of the key points that make the software as a service framework so effective, read on to learn everything you need to know about SaaS and why you should consider adopting software as a service tools for your business.

    (more…)

  • Bring Your Own Device Security Issues and Challenges

    Bring Your Own Device Security Issues and Challenges

    In theory, Bring Your Own Device (BYOD) policies sound great, but companies now face the security challenges that come with less control over employee technology. There are many security issues to consider when it comes to integrating personal devices into the workplace environment. Learn about the BYOD challenges with this complete guide.

    (more…)

  • The Cloud vs. SaaS: a Complete Guide

    The Cloud vs. SaaS: a Complete Guide

    Famed astrophysicist Carl Sagan once observed that “We live in a society exquisitely dependent on science and technology, in which hardly anyone knows anything about science and technology.” This is probably more true now than it was back then.

    “The Cloud”. It sounds like some mystical place: Somewhere out there, but it’s really just another term for the internet. The cloud is the umbrella under which Software-as-a-Service (SaaS), Infrastructure-as-a-Service(IaaS), Voice-over-internet- Protocol(VOIP), eCommerce, eMail, web sites, and pretty much everything on the internet resides.

    (more…)

  • Enterprise Information Security Architecture: What You Need To Know

    Enterprise Information Security Architecture: What You Need To Know

    Developing a high-level information security (InfoSec) infrastructure for your organization takes plenty of time and manpower.  If you’re not devoting the appropriate efforts to securing your network data, it will most likely be compromised in some way shape or form.  It is for this reason why building and nurturing an Enterprise Information Security Architecture (EISA) from idea to creation.

    Developing an EISA is more than just developing a checklist though.  It’s an undertaking that requires planning exercises that help key InfoSec team members the ability to thoughtfully define system data and protect it with robust diligence.  Let’s review what does EISA stand for, how it can be utilized in your organization, and how this dynamic set of planning and design activities can benefit the other cyber security solutions in your company.

    (more…)

  • How to Become DFARS Compliant

    How to Become DFARS Compliant

    Years ago, governments defended themselves through espionage and military engagement. Today, there are still plenty of both. However, the form they’ve taken has changed drastically. Physical spies have given way to higher levels of digital reconnaissance. To defend against these threats, the U.S government created the Defense Federal Acquisition Regulation Supplement (DFARS) in 2017.

    Without getting too deep into how DFARS functions as an organization, and what countries need to be aware of DFARS compliance, here we’ll cover go through a complete step by step breakdown of how to become DFARS compliant.

    Naturally, a government mandate tasked with protecting sensitive information is going to be extremely comprehensive and (at times) exhausting. The NIST SP 800-171 is essentially all the inputs, outputs, regulations and requirements for any businesses looking to complete their DFARS compliant statement.

    (more…)

  • What Does DFARS Stand For?

    What Does DFARS Stand For?

    If you are a client or a business that supports clients that serve the Department of Defense (DoD) as a contractor or subcontractor you’ve likely heard of Defense Federal Acquisition Regulation Supplement (DFARS).  Protecting sensitive national defense information shared with and created and maintained by private organizations that support federal government contracts is vital to our national security. DoD contractors that process, disseminate, store or transmit Controlled Unclassified Information (CUI) are required to meet DFARS minimum security standards or risk losing existing DoD contracts and eligibility for future contracts.

    (more…)

  • Do I need an NYDFS Risk Assessment?

    Do I need an NYDFS Risk Assessment?

    Sensitive data breaches and data loss are major concerns for any organization. The prospect of a financial data breach, however, often results in public panic and can lead to media headlines that destroy a business’s good reputation. In March 2017, the New York State Department of Financial Services released a new cybersecurity regulation for financial service providers, considered to be some of the most rigorous and comprehensive regulatory guidelines for the financial sector. It is the first step toward greater security to protect critical financial data that affects the lives and financial accounts of all individuals and organizations.

    (more…)

  • What Are The Soc 2 Compliance Requirements?

    What Are The Soc 2 Compliance Requirements?

    Many different auditing processes exist, and companies increasingly face the challenge of choosing which type to conduct. Consumers and business partners demand data protection, so it is vital that companies understand the differences of each auditing process available. Are you aware of the Soc 2 compliance requirements? Find out how to be compliant from the experts at RSI Security.

    (more…)