Risk-Based Approach to Cyber and Information Security
Creating a cyber and information security program can appear to be a daunting task. Maybe you need to build one from scratch, or you already have some components in place and need to update your program so that it ...
What to do After Experiencing a Data Breach
It’s Likely Your Business Will Experience A Data Breach When it comes to security issues related to technology, whether your business experiences a data breach is less a question of “if”, and more a question of “when”. ...
NCUA 2019 Supervisory Priorities – ACET and IT Risk Management
The first NCUA letter to credit unions of the new year, 19-CU-01, offers Supervisory Priorities for upcoming exams, including ACET and IT Risk Management. Among the focus items are enhanced Bank Secrecy Act Compliance ...
Security Compliance Associates Achieves HITRUST CSF® Assessor Designation
Learn More About SCA’s HITRUST Assessor Designation Security Compliance Associates, a leading provider of cybersecurity assessment and advisory services, today announced that it has been designated as a HITRUST CSF ...
7 Tips to Securing IoT (Internet of Things) Devices
When mobile phones were first introduced, if someone were to tell you that your mobile phone could be used to copy your fingerprints or steal passwords to your emails, you would have most likely laughed at them and told ...
GLBA Compliance Requirements
The Gramm-Leach-Bliley Act which is also known as the Financial Modernization ACT OF 1999, is a United States federal law that requires all financial institutions to ensure the privacy and security of customer ...
Focus on What You CAN Manage: People, Process and Technology
My father has always been a sage if wisdom throughout my life. One piece of advice he gave to help me focus and prioritize was “don’t worry about the things you can’t control and focus on what you can control”. This can ...
NAIC Insurance Data Security Model Law Update
There are two interesting updates to the progress of the NAIC Model Law. First, there are four states working to add the Model Law to their 2018 legislative calendars: South Carolina, Rhode Island, Vermont and the ...
NAIC Insurance Data Security Model Law
The Big Picture On October 24, 2017 the NAIC passed the Insurance Data Security Model Law which establishes standards for data security and for the investigation of and notification to the Commissioner of a ...