The most difficult step to take in tackling the digital security goals of an organization is often the first one. Before responding to an audit, before scheduling a penetration test, before implementing a new privacy policy or formulating an incident response plan, the most important thing a company can do right from the start about security is to have a conversation.
Read more »Tag: audit
-
Benefits of A Security Posture Assessment Posted on: May 07, 2018 In: Data Privacy & Cybersecurity
-
Information Security Considerations: Service Provider Agreements Posted on: May 08, 2017 In: Data Privacy & Cybersecurity
A business retains a vendor to perform data processing services. Malicious hackers access a vulnerable port on one of the vendor
Read more »
Blog Search
Featured Posts
- February 10, 2023 Historic Hermès Jury Verdict Paves Way for Digital Trademark Rights
- January 13, 2023 Sports Law: A Year in Review & What to Watch for in 2023
- January 06, 2023 Federal Trade Commission Cracks Down on Non-Compete Agreements
- December 06, 2022 Just In Time: Last Minute Compliance Tips for the CPRA and VCDPA
Blog Tags
alabama
arkansas
audit
bank secrecy act
biometric data
blockchain
breach notification
california
canada
ccpa
cisa
client notification
colorado
congress
connecticut
consumer data
consumer notification
consumer rights
coronavirus
covid-19
cppa
cpra
cryptocurrency
cyberattack
cyber insurance
cybersecurity
cyber threat
cyberwarfare
data breach
data privacy
data protection
data security
delaware
email
employment
equifax
eu
eu-u.s. privacy shield
european union
executive order
fbi
fcra
federal trade commission
financial fraud kill chain
fincen
fraud
ftc
gdpr
hacking
healthcare
hhsocr
hipaa
holiday season
human resources
identity theft
illinois
incident response
information security
irs
legislation
legislative alert
malware
maryland
massachusetts
microsoft
microsoft exchange servers
multi-factor authentication
multi-factor identification
new jersey
new mexico
new york
ninth circuit
nist
nist security controls
ofac
office for civil rights
opt out
personal data
personal information
phishing
privacy law
privacy protection patchwork
protected health information
ransomware
regulations
reporting requirements
sec
social engineering
social media
statute
supreme court
tax returns
treasury department
utah
vcdpa
virginia
w2
washington
wire transfers
workplace policy