Close Contact Us
Tap Here To Call Us

Articles Posted in Risk Evaluation and Management

Updated:

Ignoring Cybersecurity – It’s Not an Option

Paralysis is one of the biggest obstacles to achieving a cybersecure environment.  Companies are often unable to take the steps necessary to bring security to an enterprise. It’s not only common; it’s entirely understandable. Achieving cybersecurity appears to be an overwhelming task. Every day brings another headline announcing a data breach, or…

Updated:

Cybersecurity Surveys – Key Takeaways

Spring is the season for many things, including the publication of cybersecurity surveys. In the past few months, Verizon has published its Data Breach Investigations Reports, Ponemon Institute Published its 2016 Study on How Organizations Manage Data Breach Exposures, the California Attorney General published its annual California Data Breach Report,…

Updated:

Cybersecurity Alert: Business Management Firms and Family Offices

We are flooded with news reports of major data breaches and malware attacks. The reports focus on attacks against businesses with significant volumes of sensitive personal and financial information, like financial institutions, hospitals, retailers – and most recently, law firms. There is no question that the press pays the most…

Updated:

California Proposition Would Expand Duties and Liabilities for Collecting Personal Information

On September 26, 2013, the California Secretary of State allowed proponents of a new ballot proposition to collect signatures for the “Personal Privacy Protection Act.” The Act, if approved, would radically change the privacy landscape in California by adding new provisions to the California Constitution. Most importantly, the Act (1)…

Updated:

The Seven Deadly Sins of Data Security

There is no shortage of advice on how to secure electronic information. Companies can look to pronouncements by state and federal agencies (for example, the recent statements by the California Attorney General and the Federal Trade Commission on mobile application security), private industry (like the Payment Card Industry’s Data Security…

Contact Us