There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
role: Human Resources
External Data Hygiene is a Literal Lifesaver for Targeted Industries
What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
Managing Employee PII in the Technology Sector
Executive Takeaways With modern threats leveraging exposed employee PII, businesses must prioritize the security of their employees’ personally identifiable information (PII). In addition to deploying solutions to safeguard prized internal information,… Continue reading Managing Employee PII in the Technology Sector
Where Data Privacy and Cybersecurity Intersect (and Don’t)
A significant evolution is altering the way all organizations must regard the security of information systems. Many are not yet fully aware of it. At the core of this evolution… Continue reading Where Data Privacy and Cybersecurity Intersect (and Don’t)
Enterprise Use Cases for External Data Privacy: Part I
Executive Takeaways The effects of a laissez-faire attitude toward personal information have become all too apparent. External Data Privacy (EDP) has become an essential business service as a result. Consider:… Continue reading Enterprise Use Cases for External Data Privacy: Part I
Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Cyber crime isn’t automatically associated with violent criminal activity. That is, when we think of cyber criminal activity, we tend to think of hackers working anonymously behind computer screens to… Continue reading Doxxing, Swatting and Other Physical Threats – An Online Privacy Epidemic
Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
For some industries like High Tech/IT and Medical/Nursing, a talent shortage existed long before COVID. For these fields, employee poaching and HR churn have long been a challenge. Today though,… Continue reading Employee Poaching, Churn and External Data Privacy – How to Mount an Innovative Poaching Defense
The Executive’s Guide to Social Engineering and Spear Phishing
Executive Takeaways What is Social Engineering? Social engineering tricks people into doing something using manipulation. In the context of attacks on organizations, it is employed to gain access to sensitive information,… Continue reading The Executive’s Guide to Social Engineering and Spear Phishing
How to Mitigate Employee Poaching with External Data Privacy
Executive Takeaways The Growing Threat of Employee Poaching Organizations must learn how to mitigate employee poaching, the practice of actively recruiting employees from another organization. The means of poaching often… Continue reading How to Mitigate Employee Poaching with External Data Privacy