What’s the Difference Between SOC for Cybersecurity & Risk Assessments?
LBMC Information Security’s Mark Burnette explains the differences between SOC for cybersecurity and risk assessments, as well as tips for how your organization could benefit from from an SOC for Cybersecurity analysis.
Tennessee Clarifies Safe Harbor in its Amended Data Breach Notification Law
Tennessee restored the safe harbor provision with an update to the breach notification law. It states that firms do not need to disclose an event if the stolen data has been encrypted in accordance with the current version of the FIPS 140-2.
6 Ways Everyone Can Help Protect Against Cyber Attacks
It is important to remember that cybersecurity is not just the responsibility of the IT department within an organization. Everyone in the company can (and should) play a part in protecting against threats and helping to avoid malware infections and cyber breaches.
How to Explain PCI Compliance Penalties to Beginners
Though the Payment Card Industry Data Security Standards (or PCI DSS) applies to every merchant who accepts payment cards, many merchants lack understanding. This article covers four points to convey to a beginner.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.