Browsing: Privacy and Compliance

What’s The Difference Between Compliance and Ethics?

What’s The Difference Between Compliance and Ethics?

Compliance vs Ethics Featured Image

What’s The Difference Between Compliance and Ethics? As we celebrate Compliance and Ethics Week, we have been thinking about some of the confusion that many people have about the roles that ethics and compliance play in organizations. In this article, we discuss the difference between compliance and ethics, and how they work together and separately… read more

URGENT: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

Urgent: DOJ to Start Pursuing Government Contractors who Falsify Cybersecurity Practices

The United States Department of Justice (DOJ) has announced that it will start holding companies that have government contracts—and receive federal funding—accountable if they’ve put US information or systems at risk.  Using the False Claims Act, the Civil Cyber-Fraud Initiative will seek out cybersecurity fraud committed by companies receiving federal grants and contracts. This announcement… read more

What CMMC Maturity Level Does Your Business Model Need?

What CMMC Maturity Level does your Business Model Need

If your business plans to work with the DoD, you will need to meet the appropriate level of cybersecurity preparedness. With each year bringing an increase in the number and sophistication of cyberattacks, the DoD has made an ongoing priority to improve security around its network of suppliers and contractors, especially with regard to Federal… read more

Do You Know Your NIST SP 800-171 SPRS Score?

Do You Know Your NIST SP 800-171 SPRS Score

Posting an accurate self-assessment of your Supplier Performance Risk System (SPRS) score is the new DFARS requirement as the DoD reviews CMMC compliance standards. Ever since NIST SP 800-171r2 requirements were published, businesses across the country who want to continue filling DoD contracts have been steadily updating their security controls in order to meet the… read more

4 Protections for Businesses with Microsoft 365 Enterprise Mobile + Security

4 Protections for Businesses with Microsoft 365 Enterprise Mobile + Security

The security protections offered by Microsoft 365 give businesses new tools to safeguard data, even on remote workstations. As any IT professional will tell you, IT security is an ever-evolving landscape, with new threats emerging each year, and new tools being developed in response. While the security arms race often feels like it is escalating… read more

5 Things Your Business Needs to Know about CMMC

5 Things Your Business Needs to Know about CMMC

What does the DOD’s new Cybersecurity Maturity Model Certification mean for your business? As of this year, the DOD is rolling out a new certification standard for contractors, with the aim of tightening cybersecurity protocols and reducing vulnerabilities to possible cyberattacks. While various other regulations in the past have included cybersecurity components, the Cybersecurity Maturity… read more

Tax Security and Data Privacy Tips for Businesses

Tax Security and Data Privacy Tips for Businesses

The IRS has created a “Taxes-Security-Together” checklist to help accountants and tax preparers stay compliant. Should your business follow suit? It’s tax season, which means businesses around the country are pulling together their financial documents and submitting statements to their accountants. These documents are rich in sensitive information that can be exploited by identity thieves… read more

What Are HTTP Cookies, and Do I Need to Allow Them?

What are HTTP cookies and do you need to allow them?

Wondering why you keep being asked to allow cookies when you browse the Internet? Here’s the answer you’ve been looking for. You’ve probably heard of HTTP cookies (also known as “web cookies,” “browser cookies,” or simply “cookies”) before. Maybe you’ve visited a website and had it ask you for permission to use cookies and wondered… read more

Understanding TPISR – The Automotive Industry’s Big Shift towards Information Security

Understanding TPISR - Automotives Big Shift towards Information Security

During the 2017 AIAG Supply Chain Summit, the formation of a new working group tasked with creating a set of information security standards was announced. These standards would be created for use by the OEM’s third-party suppliers and partners, and center around protecting OEM intellectual property during contract fulfillment. Five OEM’s participated in the working… read more