What does the UK’s Data Protection Bill mean for businesses?

The UK recently published the final version of a law to replace its current data security and privacy rules. The Data Protection Bill (DPB) will allow UK businesses to continue doing business with the EU post-Brexit. The DPB should provide a relatively easy transition for businesses gearing up for the forthcoming EU legislation. Read how […]

Is a data breach at a typical organization inevitable?

Read Jason Baczynski’s commentary on whether a data breach is inevitable for any organisation on Information Management : The former CEO of Equifax recently stated in a speech to the University of Georgia that there are “those companies that have been breached and know it, and there are those companies that have been breached and […]

Creating a Culture of Data Privacy, Security in Healthcare

Read Elizabeth Snell’s article about creating a culture of data privacy and cyber security in healthcare on Health IT Security : Organizations of all sizes need to be working toward maintaining proper data privacy and security measures in the healthcare industry. The threat landscape is continuously evolving, and falling behind could lead to a large-scale data […]

Data security and breach notification in the USA

Brittany M. Bacon, Lisa J. Sotto, Jeffrey Dunifon, Aaron P. Simpson, Ryan P. Logan and Maeve Olney’s article about the state data security and data breach notification in the United States on Lexology : Sector-specific laws impose information safeguarding requirements on covered entities in certain industry sectors. For example, the Gramm-Leach-Bliley Act requires financial institutions […]

Prioritizing Data Security Strategies for Health IT Infrastructure

Read why Elizabeth Snell says that healthcare firms should prioritize their data security strategy on Health IT Security : A secure yet accessible health IT infrastructure is a fundamental requirement for all healthcare organizations. As providers adopt more digital technologies, including electronic health records, data warehouses, advanced wireless networks, and more mobile devices, they must […]

Report: Healthcare Organizations Spend $12.5 Million a Year on Cybersecurity

Cybercrime is costing businesses, on average, $11.7 million a year, a 23 percent increase from $9.5 million in cybercrime-related spending last year. The accelerating cost of cybercrime over the past five years also means that the cost of cybercrime has increased 62 percent since 2013, according to the Ponemon Institute’s Cost of Cybercrime Study. Read […]

6 big data privacy practices every company should adopt in 2018

Read Mary Shacklett list 6 big data privacy practices every company should adopt in 2018 on Tech Republic : Issues surrounding data privacy are as legally unresolved today as they were two years ago, but the recent Equifax breach now puts a clear focus on them that strikes fear into the hearts of CIOs. The Equifax data that […]

Legal-Ease: Small business data loss and protection

Read Lee R. Schroeder’s article about the legal aspect of small business data loss and protection on Lima Ohio : The recent Equifax data breach has prompted many of us individually to try to protect our identities from theft and misuse. For small businesses, the risks associated with data protection are exponentially greater than that for individuals […]

Microsoft Prepares for GDPR and Builds for Security at Scale

Unlike Las Vegas, what happens in Europe won’t necessarily stay in Europe. On May 25, 2018, the European General Data Protection Regulation will go into effect, and companies not in compliance could potentially be hit with litigation and heavy fines. Read how the software giant, Microsoft is preparing for the upcoming data breach notification regime in […]

Back to Filing Cabinets? Simplifying the Complex Task of Data Security

Read  Tom Obremski’s article about how companies can simplify the task of data protection on Security Intelligence : Data drives our businesses, economy and daily lives, so it comes as no surprise that data security needs to be a priority. But do we know what data we really have, where sensitive information is being collected […]