10 Benefits of Security Awareness Training

| | Security Awareness
Great training is the bedrock of engaged employees. Engaged means they are aware of and follow directives. Without training, employees could be making serious mistakes, especially in the realm... Go on to the site to read the full article ... Read More

How to Comply with FCPA Regulation – 5 Top Tips

| | Protecting Privacy
Introduction The Foreign Corrupt Practices Act of 1977 (also known as the “FCPA”) is a piece of United States Federal Legislation which serves two main purposes: To ensure both an... Go on to the site to read the full article ... Read More

How to Comply with HIPAA Regulations – 10 Steps

There is a tremendous amount of data in the world of healthcare. That data includes personal healthcare information (PHI), which is regulated by the Health Insurance Portability and Accountability... Go on to the site to read the full article ... Read More

How to Comply with COPPA — 7 Steps

| | Protecting Privacy
Protecting children online should be of paramount importance to all, especially in today’s world. In response to this pressing issue, in 1998 Congress enacted the Children’s Online... Go on to the site to read the full article ... Read More

The Complete Guide to CIPP/G Certification

| | IT Certifications
By possessing the Certified Information Privacy Professional (CIPP) certification, practitioners put privacy laws and policy in action. With this certification, organizations are recognized as having... Go on to the site to read the full article ... Read More

Everything You Need to Know About CIPT Certification

| | IT Certifications
Data privacy is certainly a hot topic in cybersecurity. While many technology professionals work hard on the security of data; sometimes privacy falls short. A renewed commitment to data privacy... Go on to the site to read the full article ... Read More

WordPress Phishing Scams: What Every User Needs to Know

| | Phishing
WordPress powers 30% of the web and is by far the largest content management system (CMS). It’s easy-to-use and fans that range from regular users to developers. However, popularity breeds... Go on to the site to read the full article ... Read More

How to Prevent CEO Fraud – 10 Tips

| | Asset Security
CEO fraud scams are on the rise. They aren’t that different than other phishing emails, except most get it and think it’s from the boss. The FBI labels these type of attacks as BEC... Go on to the site to read the full article ... Read More

Top 10 Anti-Phishing Email Templates

| | Phishing
Phishing remains a prominent way for cybercriminals to attack. It’s relatively easy to pull off and very profitable for perpetrators. According to research, the average cost of phishing attacks... Go on to the site to read the full article ... Read More

How to Comply with HIPAA Regulations – 10 Steps

|
There is a tremendous amount of data in the world of healthcare. That data includes personal healthcare information (PHI), which is regulated by the Health Insurance Portability and Accountability... Go on to the site to read the full article ... Read More