Search

1 to 8 of 8
Sort by

Blog Entry
Data Breaches and Implementing Proactive Security Policies

Overview: Data Breaches & Implementing Proactive Security Policies Over the past few, there have been some very high profile instances of data breaches in environments of all types. The NSA IT Administrator Edward Snowden, who accessed and shared classified NSA data, has been the most widely publicized incident around this and there has been an added push to mitigate future data breaches and examine how these types of incidences actually occurred

Errin O'Connor's profile image


Blog Entry
What are the implications of the provisions of the new EU General Data Protection Regulation (GDPR) on U.S. Businesses?

” [1] Stricter breach notification provisions Perhaps the most significant impact of the GDPR on U.S. businesses comes from the breach notification provisions. The new breach notification provisions have considerably more teeth with fines that may potentially be as high as 4% of annual revenues. The definition of “data breach” is defined broadly to include “a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed. This is in stark contrast to U.S. companies only reporting data breaches that may result in fraud or identity theft

Andrew Pery's profile image

Blog Entry
Upcoming Changes in International Data Retention Legislation

Going into effect on May 25, 2018, it places a high standard of protection on personal data held by companies by regulating the collection, use, storage, and breach notification protocol of such data

Megan Mohrmann's profile image


Blog Entry
Ensuring Compliance: Information Types Your Organization Should Be Concerned About

Regulated industries such as healthcare, finance, public sector, oil and gas, or publically traded companies may face significant regulatory and statutory penalties for inappropriate or inadequate controls that lead to a breach

Matthew Bretzius's profile image

Blog Entry
Information Security Checklist: Best Practices for SharePoint

Everywhere you turn today you hear about various instances of data loss and data breaches, all of which lead to a general sense of data insecurity...There is even frustration being felt when every part of access management seems perfect, but a breach still occurs

Matthew Bretzius's profile image