Most Common Privacy Gaps

by Sarah Harvey / October 4, 2023

As more and more governing bodies are implementing data privacy laws, it’s becoming even more important for organizations to mitigate gaps in their systems before they are met with a data breach and hefty fines. We can see the effects laws GDPR and CCPA have had on the privacy and security landscape already. Take it from British Airways’ experience – the airline was fined $228 million for leaking 500,000 customers’…

Think Like a Hacker: How Could Your Mobile Apps Be Compromised?

by Sarah Harvey / February 20, 2023

The Pros and Cons of Mobile Applications When you provide mobile apps to customers, they’re expecting them to be secure. They’ve entrusted you with their sensitive data by using your product, and it’s up to you to protect that data. Businesses today must do everything possible to mitigate the advancing threats facing mobile apps, both internally and externally. How sure are you that your organization is doing this? In this…

Biggest Breaches of 2019

by Sarah Harvey / December 15, 2022

What Were the Biggest Data Breaches of 2019? The data breaches of 2019 were enormous, with some of the biggest data breaches impacting over a billion people collectively. And, like in year’s past, hackers did not discriminate based on industry, size, or location of companies and continued to use advanced attacks to compromise user data - anything from generic, personal data to payment card information and protected health information. Let’s…

Breach Notification in New York: The SHIELD Act

by Sarah Harvey / December 15, 2022

On July 25, 2019, New York Governor Cuomo signed the Stop Hacks and Improve Electronic Data Security (SHIELD) Act which amends the state’s breach notification law in order to “impose stronger obligations on businesses handling private data to provide proper notification to affected consumers when there is a security breach.” The breach notification amendments took effect in October 2019, while the data security requirements will take effect on March 21,…

business people walking

Understanding Your Audit: Locations and Sampling

by Sarah Harvey / June 13, 2023

During the audit process, our qualified Information Security Specialists use best practices to determine the scope of the work. If you've never completed an audit, you’ve probably had questions about scoping and sampling. How many locations should be audited? Which locations are most important? How does an auditor develop a scope? What kind of sampling takes place during the audit? These are all valid questions asked by organizations undergoing an…