External data privacy management is a preventative activity focused on preempting data breaches and other damaging consequences of unsecured external data. For preventative solutions – those that don’t yield a… Continue reading Calculating the ROI into External Data Privacy Management Solutions
Privacy Threat: Recruiter Harassment
Guide to Japan’s Act on the Protection of Personal Information (APPI)
In this guide: Key facets of the Act on the Protection of Personal Information (APPI) Japan created the Act on the Protection of Personal Information (APPI) in 2003 as a… Continue reading Guide to Japan’s Act on the Protection of Personal Information (APPI)
Your Privacy Risk Score: What Is It and How is it Calculated?
What is your organization’s privacy risk score? Do you know? How about the privacy risk scores of each employee and vendor/partner associated with your organization? Do you have that information… Continue reading Your Privacy Risk Score: What Is It and How is it Calculated?
How to Stop Data Brokers? Continuity is Critical
“If you delete it, it’s gone forever!” – CISOs who have not succeeded at eliminating unsecured external data This is potentially the most dangerous misconception any CIO or CISO can… Continue reading How to Stop Data Brokers? Continuity is Critical
Case Study: Reduction in Physical Threats Against Public Health Agency Workforce
Customer: Government Public Health Organization Challenge: Solution: Results: Challenge: The workforce of a government agency responsible for developing and distributing vaccines for COVID-19 and other public health threats – and… Continue reading Case Study: Reduction in Physical Threats Against Public Health Agency Workforce
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Case Study: Securing External Data Privacy Protects Accounting Firm Talent from HR Poaching
Challenge: Solution: Results: Customer: US-Based Professional Services Firm providing tax accounting, tax law, asset management and financial strategies to midmarket to enterprise-level organizations. Challenge: In April of 2021, [REDACTED] prepared… Continue reading Case Study: Securing External Data Privacy Protects Accounting Firm Talent from HR Poaching
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
Where Data Privacy and Cybersecurity Intersect (and Don’t)
A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Enterprise Use Cases for External Data Privacy: Part I
Executive Takeaways The effects of a laissez-faire attitude toward personal information have become all too apparent. External Data Privacy (EDP) has become an essential business service as a result. Consider:… Continue reading Enterprise Use Cases for External Data Privacy: Part I