New Cybersecurity Regulations Are Coming. Here’s How to Prepare.
| | | | | | | | | | | | | | | | | | | |

New Cybersecurity Regulations Are Coming. Here’s How to Prepare.

A whole suite of new cybersecurity regulations and enforcement are in the offing, both at the state and federal level in the U.S. and around the world. Companies don’t need to just sit by and wait for the rules to be written and then implemented, however. Rather, they need to be working now to … See all articles in Insights

Data privacy truly matters to your customers. It’s time to make it a core business value
| | | | | | | | | | | | | | | | | | | |

Data privacy truly matters to your customers. It’s time to make it a core business value

The latest research shows consumers will reward businesses that make data stewardship a core value Finding issues that everyone can agree on can be tough. Ask a roomful of people if they highly value diversity and inclusion, and only half of them will raise their hands. Ask them if they care … See all articles in Insights

Most companies are unprepared for CCPA and GDPR compliance – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Most companies are unprepared for CCPA and GDPR compliance – Help Net Security

As of June 30, 2022, 91% of companies across all verticals, states, and business size that must comply with CCPA are still unprepared to meet CCPA … See all articles in Insights

NIST Releases Draft Cybersecurity Resource Guide on Implementing the HIPAA Security Rule
| | | | | | | | | | | | | | | | | | | | |

NIST Releases Draft Cybersecurity Resource Guide on Implementing the HIPAA Security Rule

Jennifer J. HennessyJurisdiction: All FederalType of Law: Communications, Media & InternetHealth Law & Managed CareAdministrative & Regulatory See all articles in Insights

The True Cost of a Security Breach
| | | | | | | | | | | | | | | | | | | | |

The True Cost of a Security Breach

There have been many articles about the cost of a security breach. With the emergence of privacy regulations that assign penalties based on a … See all articles in Insights

How GDPR Is Failing
| | | | | | | | | | | | | | | | | | | | |

How GDPR Is Failing

The world-leading data law changed how companies work. But four years on, there’s a lag on cleaning up Big Tech. One thousand four hundred and … See all articles in Insights

Privacy isn’t just a right, it’s also the right way to lose money
| | | | | | | | | | | | | | | | | | | | | |

Privacy isn’t just a right, it’s also the right way to lose money

The cost of privacy will not be footed by Apple customers. Were you aware that there is a cost to privacy? Yes, dear reader, and it turns out to be … See all articles in Insights

4 ways to stay safe on public Wi-Fi
| | | | | | | | | | | | | | | | | | | | |

4 ways to stay safe on public Wi-Fi

Traveling is once again becoming common these days, whether to far-distant locales for a vacation or just down to the local cafe to enjoy the … See all articles in Insights

How to Create Good Passwords That Hackers Will Never Guess
| | | | | | | | | | | | | | | | | | | | |

How to Create Good Passwords That Hackers Will Never Guess

Memorize these tips and tricks to create strong passwords and protect your online accounts. You already know to avoid using common, easy-to-guess … See all articles in Insights

Cybercriminals are scheduling fake meetings in people’s calendars – here’s why
| | | | | | | | | | | | | | | | | | | | |

Cybercriminals are scheduling fake meetings in people’s calendars – here’s why

If you receive a calendar invite to view new fax documents, be careful – it’s most likely a phishing attack, attempting to obtain your identity and … See all articles in Insights