Consulting

June 4, 2015
Comments [0]

Law firms may unwittingly place clients at risk by failing to dispose of their records in a responsible manner once they’re no longer useful.

Law firms can eliminate client exposure by developing information governance programs that reduce the risks of unwanted exposure of sensitive, protected and confidential information.

Learn more in “Are You the Weak Link in Your Client’s IG Program...

Read More
June 4, 2015
Comments [0]

Small and mid-sized companies are confronting the same information security exposures as large organizations, with smaller budgets and, often, less focus on locking down their business data. Cybercriminals recognize the opportunity, not just to breach small companies, but also to use smaller companies as a foothold to penetrate networks of the big corporations they do business with. ThirdCertainty.com asked Raj Dodhiawala...

Read More
January 28, 2015
Comments [0]

The president has discussed the issues of data privacy and cyber security several times recently, both during press conferences and the State of the Union address. He has put forth a handful of proposals to encourage more robust and more effective information sharing between the federal, state and local governments and organizations in private industry. While the goal of improved information sharing is a good one, there may be some flaws in these proposals.

Communications...

Read More
January 27, 2015
Comments [0]

Small and medium-size businesses outsource a number of IT functions to improve operations and reduce costs. As they face growing data security threats—employee error or theft, cyber attacks, and more—it’s critical for SMBs to develop robust information security programs.

While it may not make financial sense for SMBs to bring a chief information security officer on board, the organizational need for this resource is clear. A surprising 77 percent of SMBs...

Read More
January 26, 2015
Comments [0]

Small and medium-size businesses face mounting risks to their data security. Data breaches at large corporations such as Sony Pictures and Morgan Stanley make headlines. But many smaller organizations are typically more vulnerable to threats because they lack the technical and financial resources necessary to properly protect sensitive data.

There are a number of reasons why. Many SMBs are unaware of cybersecurity best practices, according to the National...

Read More
January 16, 2015
Comments [0]

While the FBI claims hackers were behind the Sony Pictures breach, other experts suggest the attack was from a more sinister source: a malicious insider.

Malicious insiders intentionally take confidential institutional data for their own purposes. They can be current and former employees, contractors, business partners, or anyone with access to the organization’s confidential personal or corporate information. So it’s critical for organizations to enter into employment and contractual...

Read More
December 30, 2014
Comments [0]

Medical identity theft is a growing problem that has a dramatic ripple effect on healthcare organizations, providers, and patients.

"Big data, Big Brother, data brokers, and data breaches all violate our privacy," said Dr. Deborah Peel, founder and chairwoman of Patient Privacy Rights. "The systems put in place that make us feel safe are largely unable to protect patient information."

Learn...

Read More
October 30, 2014
Comments [0]

shutterstock_174725519

By Christine DiGangi

More than 530,000 taxpayers with identity theft indicators on their tax...

Read More
October 3, 2014
Comments [0]

California law

California has toughened up its data disclosure law, pioneering legislation enacted in 2003 that directs companies and organizations to inform individuals when their personal data is compromised.

An amendment,...

Read More
September 26, 2014
Comments [0]

3C Privleged Accounts

Companies have been distributing privileged accounts to employees and vendors for the past 20 years without considering the security ramifications.

... Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started