Browsing: Privacy and Compliance

5 Things Your Business Needs to Know about CMMC

5 Things Your Business Needs to Know about CMMC

5 Things Your Business Needs to Know about CMMC

What does the DOD’s new Cybersecurity Maturity Model Certification mean for your business? As of this year, the DOD is rolling out a new certification standard for contractors, with the aim of tightening cybersecurity protocols and reducing vulnerabilities to possible cyberattacks. While various other regulations in the past have included cybersecurity components, the Cybersecurity Maturity… read more

Tax Security and Data Privacy Tips for Businesses

Tax Security and Data Privacy Tips for Businesses

The IRS has created a “Taxes-Security-Together” checklist to help accountants and tax preparers stay compliant. Should your business follow suit? It’s tax season, which means businesses around the country are pulling together their financial documents and submitting statements to their accountants. These documents are rich in sensitive information that can be exploited by identity thieves… read more

What Are HTTP Cookies, and Do I Need to Allow Them?

What are HTTP cookies and do you need to allow them?

Wondering why you keep being asked to allow cookies when you browse the Internet? Here’s the answer you’ve been looking for. You’ve probably heard of HTTP cookies (also known as “web cookies,” “browser cookies,” or simply “cookies”) before. Maybe you’ve visited a website and had it ask you for permission to use cookies and wondered… read more

Understanding TPISR – The Automotive Industry’s Big Shift towards Information Security

Understanding TPISR - Automotives Big Shift towards Information Security

During the 2017 AIAG Supply Chain Summit, the formation of a new working group tasked with creating a set of information security standards was announced. These standards would be created for use by the OEM’s third-party suppliers and partners, and center around protecting OEM intellectual property during contract fulfillment. Five OEM’s participated in the working… read more

The When, Where, and How of Encrypting Data at Rest

Image of hard drive with USB sticks and a lock on top representing encrypting data at rest.

Encryption at rest can protect your data, even if someone steals it. Data security comes in many forms. In order to keep your business safe from a security breach, you need to protect your data from destruction, spying, and outright theft. Protecting yourself requires different lines of defense, and at the forefront of these is… read more

5 Client Data Protection Tips to Keep Your Customers Safe

padlock on top of motherboard

5 ways your business can manage security to protect sensitive client information. Losing sensitive client data, such as login credentials, credit card information, medical records, or financial reports, can have disastrous consequences for your business, from both a legal and PR standpoint. Fortunately, there are steps you can take to safeguard against these security breaches…. read more