There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
Industry: Retail
Your Newly Vulnerable Attack Surface and How to Reduce It
In 2023, a surprising number of organizations operate with a newly expanded attack surface. Even though most already invest significantly in cybersecurity. All companies are acutely aware of the threat… Continue reading Your Newly Vulnerable Attack Surface and How to Reduce It
Enterprise Use Cases for External Data Privacy: Part II
Welcome to the second part of our Enterprise Use Cases for External Data Privacy article series. In part one, we discussed the importance of External Data Privacy (EDP) and explored… Continue reading Enterprise Use Cases for External Data Privacy: Part II
The Competitive Advantages of Employee Data Privacy
Executive Takeaways The Competitive Advantage of Prioritizing Data Privacy Exposed employee Personally Identifiable Information (PII) has led to more social engineering and spear phishing attacks on organizations. As such, organizations… Continue reading The Competitive Advantages of Employee Data Privacy
Guide to Complying with Looming Procurement Requirements for Privacy Risk
Getting Ahead of the Next Critical Privacy Risk Requirement for Winning Lucrative Business Contracts Competition has always been stiff to win lucrative contracts. Especially with large corporate entities, businesses, private… Continue reading Guide to Complying with Looming Procurement Requirements for Privacy Risk
Optimizing Vendor Risk Management with External Data Privacy
Executive Takeaways Organizations are increasingly reliant on third-party vendors to supplement or complement operations. This increasing reliance expands organizational threat surfaces, as vendors require access to sensitive employee and customer… Continue reading Optimizing Vendor Risk Management with External Data Privacy
Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
American consumers are becoming more aware of the dangers inherent in allowing their personal data to be collected and manipulated, unmanaged by Data Brokers and People Search Sites online. Most… Continue reading Exposing the Threat to Data Privacy Posed by Data Brokers & People Search Sites
Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
Chief Information Security Officers can dramatically improve the efficacy of their efforts to interrupt costly and disruptive social engineering attacks on their organizations by addressing the root cause of these… Continue reading Mitigating Exposed PII Dramatically Lowers Risk of Data Breach via Social Engineering
How to Mitigate Employee Poaching with External Data Privacy
Executive Takeaways The Growing Threat of Employee Poaching Organizations must learn how to mitigate employee poaching, the practice of actively recruiting employees from another organization. The means of poaching often… Continue reading How to Mitigate Employee Poaching with External Data Privacy
Why Cybersecurity is Not Enough
Executive Takeaways The Importance of Data Privacy in Complementing Cybersecurity Measures The importance of cybersecurity cannot be overstated. Without it, digital assets would be vulnerable to malicious actors. Unfortunately, cyberattacks… Continue reading Why Cybersecurity is Not Enough