How to Comply with FERPA

| | Protecting Privacy
Higher education is not only a popular way to expand one’s knowledge; it can also open doors to employment and other opportunities. This translates into millions applying to colleges and... Go on to the site to read the full article ... Read More

How to Document Security Incidents for Compliance in 10 Steps

Introduction Many organizations are subject to regulations that enforce compliance to federal standards, such as HIPAA. This is because these organizations often operate in sensitive ways,... Go on to the site to read the full article ... Read More

Top 10 Security Tools for Bug Bounty Hunters

| | Job Outlook
Bug bounty hunting is a career that is known for heavy use of security tools. These tools help the hunters find vulnerabilities in software, web applications and websites, and are an integral... Go on to the site to read the full article ... Read More
How to Comply with FCRA — 6 Steps

How to Comply with FCRA — 6 Steps

| | Protecting Privacy
Introduction The Fair Credit Reporting Act, or FCRA, is a piece of legislation passed by Congress in 1970 to promote fairness, accuracy and privacy for information that consumer reporting agencies... Go on to the site to read the full article ... Read More

What is DoD 8570?

| | DoD 8570
Department of Defense Directive 8570, or DoDD 8570 provides guidance and procedures for the training, certification, and management of all government employees who perform IA functions in their... Go on to the site to read the full article ... Read More
How to Detect and Prevent Secure Document Phishing Attacks

How to Detect and Prevent Secure Document Phishing Attacks

| | Phishing
Secure document phishing attacks are some of the latest in client endpoint exploits that have been plaguing the computing world. While these phishing attempts may fool the uninformed, by reading this... Go on to the site to read the full article ... Read More

How to Comply with COPPA — 7 Steps

| | Protecting Privacy
Protecting children online should be of paramount importance to all, especially in today’s world. In response to this pressing issue, in 1998 Congress enacted the Children’s Online... Go on to the site to read the full article ... Read More

How to Comply with the Red Flags Rule

| | Protecting Privacy
Introduction The Red Flags Rule, or RFR, is one of the identity protection rules found in the Federal Credit Reporting Act (FCRA). More specifically, RFR deals with protecting individuals from... Go on to the site to read the full article ... Read More

How to Comply with FCRA — 6 Steps

| | Protecting Privacy
Introduction The Fair Credit Reporting Act, or FCRA, is a piece of legislation passed by Congress in 1970 to promote fairness, accuracy and privacy for information that consumer reporting agencies... Go on to the site to read the full article ... Read More

Vendor Management and Privacy Compliance

| | Protecting Privacy
Overview It has become commonplace in today’s business world to use third-party vendors for certain tasks that would prove too difficult, time-consuming or resource-demanding to carry out... Go on to the site to read the full article ... Read More
Loading...