Management, compliance & auditing February 2, 2015 Daniel Dimov What US Companies Need to Know about EU Privacy Laws 1. Introduction The European Union (EU) is a large politico-economic union consisting of 28 countries, having a total population of more than 500,000 million...
Management, compliance & auditing January 6, 2015 Dan Virgillito Acceptable Use Policy Template For University IT Systems Universities, colleges and other higher education institutions store PII (Personally Identifiable Information) such as credit card numbers, email addresses,...
Management, compliance & auditing December 2, 2014 Dan Virgillito A physical security policy can save your company thousands of dollars Investments in cybersecurity and physical security are proportionally connected to your organization's improved financial picture for a long-term perspective....
Management, compliance & auditing November 6, 2014 Dan Virgillito Acceptable Use Policy Template for User Level Passwords As technology radically shapes the working environment of users across the globe, we are also responsible for keeping up with the security trends to avoid data...
Management, compliance & auditing October 29, 2014 Dan Virgillito DDoS Security Policy Template to Prevent Massive Attacks It sounds like the 90s sci-fi horror thriller, "Tremors". Unfortunately, today, it could easily be a headline from the recent space of distributed-denial-of-service...
Management, compliance & auditing October 14, 2014 Dan Virgillito The Importance of an Online Encryption Policy within an Organization Benjamin Franklin once said, "If you fail to plan, you plan to fail." This quote summarizes the importance of online encryption policy and hands-on implementation...
Management, compliance & auditing October 7, 2014 Dan Virgillito IT Security Policies Should Include a Physical Security Policy We live in a world that's becoming ever more dependent on the various digital products at our disposal. From the average man on the street making purchases...
Management, compliance & auditing September 25, 2014 Kenneth Leeser To Reduce Risk, De-emphasize “C” and Focus on “G” By their nature, business endeavors involve various elements of risk. These elements may include technological, commercial, legal, financial, and environmental...
Management, compliance & auditing September 23, 2014 Dimitar Kostadinov The essentials of an acceptable use policy An Acceptable Use Policy (henceforward mentioned as "AUP") is agreement between two or more parties to a computer network community, expressing in writing...
Management, compliance & auditing September 11, 2014 Security Ninja Want to Limit PCI DSS Scope? Use Tokenization Every organization should follow a proactive rather than a reactive approach to protect against threats, risks and vulnerabilities, to which if their IT infrastructure...