January 20, 2021

2 Signs An Organization is Serious About Privacy

Despite its growing importance amid alarming government and corporate surveillance, privacy today is often used as a buzzword. It’s commonly misused to describe individual elements of the practice, such as transparency, while other critical components, like respect and control, are missing completely. Moreover, privacy professionals inside any organization are limited by the authority and resources allotted to them. Instead of relying on public messaging, the headwinds privacy teams face internally is a better measure of the overall organization’s commitment to privacy.

January 19, 2021

A Tale of COVID and Privacy

My wife and I have been very careful about “staying within our Bubble,” but it was bound to happen. Someone outside of our small group had encountered someone who tested positive and the “Bubble” began to burst. It made me consider privacy in this time of pandemic.

January 4, 2021

6 Questions About the CPRA, Answered

If you’re like most people, you’ve got some questions about the new California privacy law that passed in November of 2020.
Called the California Privacy Rights Act (CPRA), it’s a comprehensive privacy law that provides significant protections to California citizens who wish to exert more control over the data they share with companies.

October 28, 2020

Start secure to be secure

As long as human beings have roamed the earth, the need for security has existed. When civilizations evolved, so did the need for more sophisticated security. Security technology has advanced from structurally sound walls and doors to mechanical and electronic locks, followed by complex monitoring systems and biometric technology. Thanks to the internet, digital networks and unlimited software development possibilities, there is a whole new domain called cyber space that must be secured.

October 27, 2020

The Future of Security for Connected Devices

Remember all the experts saying the Internet of Things would bring explosive growth to the world of connected devices? Well, not only were they right, but that explosive growth is happening right now, bringing a host of both innovative devices and potential new security headaches.
How quickly is the world adding devices to the Internet? So quickly that even leading industry observers aren’t totally sure what the number is. In the last year, Cisco estimated 2020 would see 27 billion devices added, while Security Today estimated it would be 31 billion new devices. Either way, that’s almost 1000 new devices each second!

October 22, 2020

Top 3 Cybersecurity Tips to Protect Your Device(s)

The line between our online and offline lives has become even more indistinguishable this past year. For many of us, our homes are now our offices and, in some cases, our schools. The number of — and time spent on — devices your customers & employees use to “virtually engage” can make thinking about security overwhelming. Each device that’s connected to the internet is a device that, unfortunately, can be compromised so it is important to protect each one individually. In line with the theme of this year’s Cyber Security Awareness Month (CSAM), “If You Connect It, Protect It,” this week we are providing three simple tips for you to share with your customers & employees to help them protect their devices. These are good reminders for all of us – businesses & consumers alike – to own our role in cybersecurity and reduce our individual and collective risk.

October 20, 2020

Putting People at the Center: Three Ways the Healthcare Industry Can Proactively Prevent Cyberattacks

Cybersecurity in healthcare—like the healthcare industry itself—is all about people, not the doctor’s office. And in the midst of the COVID-19 pandemic and telemedicine, patients are looking for more control and improved health outcomes, which is driving the industry beyond the four walls of the typical medical setting. In 2020 alone, telehealth is expected to grow a staggering 65 percent. A broader healthcare security strategy must focus on people—the ways they work and the ways protected health information is stored and sent when providing care.