In 2017, 83000 data protection officers (DPOs) were appointed; now, there are over half a million! This 700% increase in the demand for DPOs has been majorly attributed to GDPR implementation requirements. Intrigued by this surge in demand for data protection expertise? GDPR is said to be one of the most rigorous data protection laws…
If you process highly sensitive data in your systems, a basic security checklist of individual actions or tools – firewall, antivirus, data encryption won’t suffice. You need to safeguard your organization using a broader perspective and comprehensive approach covered in frameworks like NIST. The NIST 800-53 control families outline a set of controls organizations can…
Applications used in daily life collect large amounts of data through embedded trackers. This data could potentially be used in a cyber attack, leading to a violation of data privacy. According to Salesforce, 60% of their customers felt they had no control over how their personal data is used. The European Union established the General…
If you’re in the healthcare industry, you’ve most definitely heard about HIPAA. The Health Insurance Portability and Accountability Act (HIPAA) was created to protect your personal health information from being released without your permission. It’s important for everyone involved in dealing with or managing patient data – medical providers, pharmacies, insurance companies, and third-party administrators…
Maintaining a secure environment has become the top priority with the increasing volume of malicious attacks on business processing user card data. The (Payment Card Industry Data Security Standards) PCI DSS compliance, though not legally mandated, is a globally accepted security standard for businesses processing transactions either in physical or digital form. This article focuses…
Bagging an ISO 27001 certification can amplify your reputation, bring you new business, improve security status, and save you from regulatory penalties. But the checklist of items can seem never ending—a typical audit has ten management system clauses and an annexure stating 114 information security controls. You can do-it-yourself and get certified. That’s certainly possible….