Entries by Jenna Kersten

Cheat Sheet for Office 365 Forwarding Rules

Protecting Your Office 365 Accounts A key part of your organization’s information security strategy is correct configurations for Office 365, because compromising your Office 365 accounts is a gateway to much more sophisticated attacks. Many industry breach reports speculate that hacking Office 365 email accounts is the first thing an attacker wants to do, because […]

Learning from Twitter’s Privacy Mistakes

Because of the ever-changing landscape of privacy laws, standards, and guidelines, it has become difficult for businesses to know what their obligations are, and even harder to determine what could constitute non-compliance. Fortunately, Twitter’s mistakes now provide us with an example of what a violation looks like. Twitter has been in the spotlight for a […]

What’s Going On With the EU-US Privacy Shield Agreement?

The Latest With Privacy Shield On July 16, the Court of Justice for the European Union made a landmark decision to invalidate the EU-US Privacy Shield arrangement for international data transfers. Prior to this announcement, Privacy Shield was one of several mechanisms for meeting GDPR data protection requirements for data leaving the EU for the […]

Tower MSA Partners Receives SOC 2 Type I Attestation

Independent Audit Verifies Tower MSA Partners’ Internal Controls and Processes Delray Beach, FL – Tower MSA Partners, a Medicare Secondary Payer compliance and Medicare Set-Asides services company, has completed its SOC 2 Type I audit. Performed by Kirkpatrick Price, this attestation provides evidence of Tower’s strong commitment to security and delivering high-quality services to its clients […]

5 Common Cloud Security Misconfigurations for AWS

Security incidents caused by misconfigurations in the cloud happen every single day. In fact, DivvyCloud reports that over the last two years, 33 billion records have been exposed because enterprises struggle to implement proper cloud security. When you take that number and consider Ponemon’s research, which estimates the average cost per compromised record is $150, […]