How to Prevent Ransomware After Your Business Reopens
How to prevent ransomware during a business reopening. As states continue easing their COVID-19 stay-at-home orders and allow more people to return to physical workplaces, business owners are focusing on how to protect their workers’ health. This means a focus on enhanced cleaning schedules, sanitizing stations, staggered schedules, and desk […]
Implementation of the Illinois Financial Institution Cyber Security Act
Learn more about the Illinios Financial Institution Cyber Security Act. The financial service industry is the leading target of cyberattacks. According to Forbes, financial institutions experience 35% of all data breaches. These institutions depend heavily on information technology systems to process millions of transactions. What’s more, they’re privy to a […]
Pandemic and Business Continuity Planning – Where the Rubber Meets the Road
Learn more about business continuity planning in the face of the COVID-19 pandemic. The past few weeks have presented all of us with a great deal of operational challenges that ultimately brought us back to our current Business Continuity Planning for guidance. As we reviewed those plans, we all quickly […]
A Remote Workforce Risk Assessment is the First Step in Remote Work Security
Improve security of employees working from home with a risk assessment. Advances in technology have created opportunities for people to work away from the office. The benefits of remote working are well-documented in terms of reduced costs for employers, saving time and travel costs, greater flexibility for employees, and increased […]
Transitioning to a Remote Workforce: Secure Remote Access
How to secure remote access workers during the COVID-19 outbreak and beyond. While the global spread of the COVID-19 coronavirus has caused many employees to work from home, the number of remote workers was growing exponentially well before that. According to a report based on information from Global Workplace Analytics, […]
What is the Average Cost of a Data Breach?
The costs of a data breach are only going to increase, adding to the necessity of information security and compliance measures. Data breaches have gained widespread attention as more businesses are attacked by malicious insiders and hackers on a daily basis. With businesses becoming increasingly reliant on cloud computing, digital […]
Ransomware Prevention: What Measures Should You Take to Protect Your Information?
Many government and non-government entities have already been affected by ransomware attacks. Malicious software used by cybercriminals to encrypt important information from computers and hold it for ransom has significantly evolved over the years. Ransomware, as it’s known, has become a lucrative industry for cyberthieves and continues to intensify as […]
Data Breach Law in Hawaii
Data Breach Law in Hawaii Statute Codes Breach notification law for Hawaii is covered under H.R.S. § 487N-1 et seq., which includes S.B. 2290, and S.B. 2402. S.B. 2290, Act 135, was put into law on May 25, 2006. It became effective on January 1, 2007. S.B. 2402, Act 19, […]
Information Security Breach in Georgia
Georgia Information Security Breach Law Statute Codes Breach notification laws in Georgia are covered under the Georgia Personal Identity Protection act, Ga. Code § 10-1-910 et seq. This includes S.B. 230, and 236. S.B. 230 was signed into law on May 5, 2005, and became effective May 5, 2005. S.B. […]
Data Breach Notification in Delaware
What are the data breach notification laws in Delaware? Statute Codes Breach notification in Delaware is covered under a section of state law called Computer Security Breaches. The official designation is Del. Code Ann. tit. 6 § 12B-101 et seq. It includes H.B. 116, which became law June 28, 2005, […]