Tag "IT Compliance"

Back to homepage
IT Compliance

The Five States of Compliance Maturity: Building a Strong Training Strategy

Even though many businesses invest in useful compliance training to help reduce the liability and legal risks they face, for some, integrating that training with their business strategy means overcoming

IT Compliance

Do Third-Party Users Follow Security Best Practices and Policies?

Many organizations across the globe fall short of effectively managing access for third-party users, exposing them to significant vulnerabilities, breaches and other security risks, One Identity reveals. Click here to view original

IT Compliance

To Improve Incident Response, You Need to Consider 3rd Party Solutions

Organizations reported an average 32% reduction in threat responder workload when they deployed a managed SIEM solution, according to CenturyLink and IDG. Click here to view original webpage at www.helpnetsecurity.com

Industry Insights

Cybersecurity & data privacy trends in 2020

2020 will be the year when multiple nascent cybersecurity trends converge. Cybersecurity continues to be the number one “external concern” for American CEOs, regardless of their industry. That’s because the

IT Compliance Vendor News

Mozilla Hardens Firefox Against Injection Attacks

The first codebase change impacts the built-in about:pages that Firefox ships with, and which were designed to provide an interface to the internal state of the browser. about:config is the best known of them,

IT Compliance Vendor News

Click2Mail Informs Users of Data Breach

Click2Mail allows customers to create, personalize, and proof mailpieces, as well as to acquire, build, and manage mailing lists. With the help of Click2Mail’s web browser-based tools, users do not

IT Compliance

Most Expect the Risk of Privileged User Abuse to Increase

Insufficient privileged access management (PAM) practices continue to be a critical challenge for many organizations despite significant risks of data breaches and security incidents, according to Sila and Ponemon Institute. Click here to

IT Compliance

Cyber Security Nordic: Have data? Use it, delete it

Toxic data in the industry parlance usually means non-consented information obtained from users, which poses the chance of penalties under data protection regulations. However, data hoarded without any immediate use

IT Compliance

As consumers engage with insurance companies online, new types of digital fraud emerge

 As more U.S. consumers use digital platforms when engaging with insurance companies, new fraud challenges are likely to arise for insurance carriers, according to TransUnion and iovation. Click here to view original

IT Compliance

Organizations continue to struggle with privacy regulations

Many organizations’ privacy statements fail to meet common privacy principles outlined in GDPR, CCPA, PIPEDA, including the user’s right to request information, to understand how their data is being shared with third