Archive for the ‘privacy’ Category

EU Digital Operational Resilience Act: What Financial Institutions Need to Know

On the back of the 2020 EU Cybersecurity Strategy, EU legislators enacted several regulations aimed at creating a more robust EU cybersecurity framework. This includes the Digital Operational Resilience Act (DORA), which aims to harmonize fragmented approaches to regulation around…

Finding a Safe Place for Your Data and Software

  Your organization runs on data and software. But this whole IT environment needs to live somewhere. Preferably a safe place that no unwanted people can access. What options do you have? How should you choose where to host your…

EU-US Privacy Shield – Updates and the Repercussions

EU-US Privacy Shield Framework The Privacy Shield program is being administered by the International Trade Administration (ITA) within the U.S. Department of Commerce, to enable enterprises in the US to join the EU-US Privacy Shield framework. This program enables these…

What is Geo-fencing? And How Does it Play a Role in Data Privacy?

  Geo-fencing is a new term in the digital marketing space that puts the location of the devices to work for the provision of services. The services could be push messages and notifications that a user gets when the device…

Data Leak Prevention Technology – Top DLP EFSS Solutions 2020

  Data Leak Prevention Technology: Data leak prevention technology keeps sensitive corporate data secure by identifying potential data breaches and helping to eliminate them. DLP software classifies, regulates confidential business data, and identifies data violations typically driven by regulatory compliance…

Protecting Remote Work Data From Cyber Threats

What has changed though with the COVID-19 crisis is the choice to work from home or office. Many governments across the world have made it mandatory that organizations provide work from home options to their employees, wherever applicable. Thus, the…

Privacy In The Digital Age | Why Digital Privacy Is Important

Several companies have begun exploring how they can enhance the protection of users’ data and play a role in the continuing conversation about privacy as a human right. Those that are yet to do so have to develop the necessary…

GDPR Presents Opportunities for MSPs

In today’s digital world, the issue of data privacy is provoking constant debates with large corporations and even governments being objurgated for invasions of privacy. According to online statistics firm Statista, only about a third of internet users in the…

ITAR Regulations {International Traffic in Arms Regulations}

    ITAR was enacted in 1976 to control the export of defense-related articles and services. It stipulates that non-US persons are not allowed to have logical or physical access to articles modulated by International Traffic in Arms Regulations; which…

Personal Data Breach Response Under GDPR

Data security is at the heart of the upcoming General Data Protection Regulation (GDPR). It sets strict obligations on data controllers and processors in matters pertaining data security while concurrently providing guidance on the best data security practices. And for…