Factors to Consider When Designing a Business Video Surveillance System

A high-quality video surveillance system is one of the most important investments your business can make, helping to keep your premises, employees, customers, and possessions safe. Yet, there are a wide variety of factors to consider, ranging from how many cameras you need, to whether or not you want a remote video surveillance system. CCTV […]

Protecting Data from Departing Employees

Countless formal and informal studies show that most employees retain at least some company data when they leave a job. The reasons vary from the benign (like when an employee inadvertently keeps a work flash drive) to the more malicious (in the case of an employee’s deliberate theft of company trade secrets for use at […]

Compliance network map drawn on a tablet

Expert Sheds Light on the Google+ Data Breach

The initial reporting around the data breach that led to the shutdown of the drastically under-used social network Google+ also led to many comparisons to the many security issues Facebook has been dealing with. However, the narrative changed over the next few news cycles, leaving many to question what really happened, and what (if any) […]

Antibes, France - February 21, 2018: User deletes Facebook app from iPhone. The social media platform faces increased scrutiny around personal data privacy and its handing of fake news and extremist content.

GDPR Could Have First True Test With Facebook Breach

Since the European Union’s (EU) General Data Protection Regulation (GDPR) took effect at the end of May, it’s been a waiting game to see what actions might trigger a major response. Although there has been an overall spike in complaints since the regulation took effect, there hasn’t been a large enough event to catch headlines […]

protecting idendity fingerprints or id fraud from binary codes as like rain, guarding identity symbol and personal information

GDPR Creates Challenges for Employers

One of the biggest stories from the first half of 2018 was the implementation of the European Union’s General Data Protection Regulation (GDPR). For U.S.-based companies, there’s a strong temptation to throw your hands up and say, “So what?” But the main thrust of GDPR’s policy is personal as opposed to geographic. In other words, […]

Researcher examining code.

Top 10 Cybersecurity Challenges to Keep an Eye on in 2018

Ensuring cybersecurity of your business becomes a bigger challenge every year. Cybercriminals perform new attacks, exploit new vulnerabilities, and perform new attacks on a constant basis while regulatory institutions change and improve standards. Your task is to be fully prepared to face these challenges. So today, we gathered the top 10 cybersecurity hot topics you’d […]

Running Female With Mobile Phone Connected To A Smart Watch

Data Breach Laws Could Get Tested as Fitness App Leaks Personally Identifiable Information

It is a story we’ve heard many times in the first 6 months of 2018: An independent researcher finds a critical vulnerability in the code of a popular app or website that leaks personally identifiable information. They reach out to a tech journalist or colleague to investigate. Once confirmed, the researcher or journalist reaches out […]

Policy Regulation Compliance

Survey Suggests That Most U.S. Businesses are Unprepared to Handle GDPR Compliance

While the lead up to the enforcement date of the European Union’s (EU) General Data Protection Regulation (GDPR) was highly publicized, a recent survey suggests that most U.S. companies are unprepared to comply … if they’re aware at all. The May 2018 online survey was conducted by CompliancePoint, an information security and risk management firm. […]

A Bad Two Weeks for Location Tracking Companies

Companies built around harvesting and selling third-party data have been subject to growing scrutiny since the Facebook/Cambridge Analytica story broke earlier this year. This trend of increased monitoring is likely to continue as more and more people choose to track what and how much of their personal information is collected, and what companies are doing […]