Cloud computing is becoming popular for applications across the technology spectrum, from storing user data to hosting web applications. However, cloud environments are frequent targets for cybercriminals, meaning organizations must…
-
-
What Type of Social Engineering Targets Particular Individuals or Groups?
by RSI Securityby RSI SecurityWhen cybercriminals use social engineering attacks, they manipulate their targets into providing them access to sensitive information. These attacks are becoming widespread and impacting more organizations each year. But, what…
-
Using networked endpoints in your organization presents cybersecurity risks both to the networks they’re connected to and your broader IT infrastructure. However, with the help of endpoint detection response tools,…
-
When working toward HIPAA compliance, it is crucial to understand exactly what is considered PHI under HIPAA. PHI, or Protected Health Information, refers to any patient data that can be…
-
Years ago, businesses were relatively self-contained. The most important stakeholders were generally internal to a company, and strategic partners were fewer and more carefully chosen. Now, the globalized business environment…
-
Safeguarding data privacy is essential to becoming and remaining compliant with the GDPR. Using a GDPR privacy policy checklist, you can keep track of the types of data that require…
-
What is the NYDFS Cybersecurity Regulation? The NYDFS Cybersecurity Regulation – also referred to as 23 NYCRR 500 – is a set of regulations that are considered as cybersecurity best…
-
One of the most challenging aspects of compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is understanding how to store sensitive data. This is partly because…
-
Under the oversight of the SEC, FINRA protects investors in the United States by requiring broker-dealers to conduct fair financial market transactions. Compliance with the FINRA retention requirements helps broker-dealers…
-
To remain safe from cybersecurity threats, you must develop a comprehensive understanding of how these threats might unfold and eliminate as many exploitable risks as possible. One way to do…