A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Industry: E-Commerce
Facts About Data Breaches and the Mid-Market
Budget Conscious Solutions for Protecting Mid-Market Companies One size does not fit all when it comes to defending companies against data breaches. The threat of cyber crime and the consequences… Continue reading Facts About Data Breaches and the Mid-Market
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
Optimizing Vendor Risk Management with External Data Privacy
Executive Takeaways Organizations are increasingly reliant on third-party vendors to supplement or complement operations. This increasing reliance expands organizational threat surfaces, as vendors require access to sensitive employee and customer… Continue reading Optimizing Vendor Risk Management with External Data Privacy
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
External Data Security and Vendor Risk
The Case for External Data Privacy (EDP) Controls for Organizations and their Affiliates/Partners Leading information security professionals at organizations of all sizes, both public and private, may be operating with… Continue reading External Data Security and Vendor Risk
External Data Privacy Vs. Identity Theft Protection
For threat actors, access to employee or corporate data enables social engineering (including spear phishing) and other cybercrimes. This illicit access can lead to identity or IP theft, stolen money,… Continue reading External Data Privacy Vs. Identity Theft Protection
External Data Privacy Protection: It’s Smart Business
External Data Privacy (EDP) is crucial to businesses as it protects against unauthorized access, use, and sharing of assets. It also provides an added layer of defense against data breaches… Continue reading External Data Privacy Protection: It’s Smart Business