EU GDPR demystified: a straightforward reference guide for US firms (PART TWO)

Posted by:

Understanding whether you are impacted by GDPR is a key first step. A survey, carried out at RSA 2017 by Imperva, found that just 43% of companies are preparing for GDPR, 29% were not preparing, and 28% were unaware of any specific preparations being made.

Even if you have no base in one of the EU’s 28 countries, you can still be held accountable if you mishandle the personal data of EU residents. 

MORE FROM TBG SECURITY ON ...

Read More →
0

EU GDPR demystified: a straight-forward guide for US firms (PART 1)

Posted by:

Ahhh GDPR, the EU General Data Protection Regulation (EU-GDPR), the new European data legislation that revamps 20-year-old data protection laws to align with our digital age. It’s a radical and unprecedented piece of legislation, whittled down to a whopping 99 Articles, categorised in 11 Chapters.

Ugh.

AS if 99 articles isn’t bad enough, the effective date is coming sooner than you think….. May 2018, less than a year away.

Some of you, we know, are facing it head on, grappling with how ...

Read More →
1

Trump’s budget blueprint: what’s it mean for cybersecurity?

Posted by:

Last week, we saw the release of the US’s 2018 budget blueprint.

Before I even read the document, I did a random search on some security-related keywords within the 2018 budget to see how many times each one showed up. I found the results rather revealing. Make of this what you will:

  • Cyber: 15
  • Security: 68 (5 of which refer to Homeland Security)
  • Attack: 4
  • Privacy: ...
Read More →
0

US border controls, electronic devices and privacy: what to think about

Posted by:

Since the new US president’s executive order, designed to improve screening and vetting procedures in the name of reducing illegal immigration and terrorist threats, privacy groups like the American Civil Liberties Union and Electronic Frontier Foundation (or the EFF) have voiced concerns about an increase in the number of invasive digital practices during border inspections.

In other words – privacy groups saying that more travellers are being asked to surrender their devices and passcodes are often.

The Privacy groups ...

Read More →
0

Why you can’t find a good CISO for love or money (but we have a solution…)

Posted by:

Are you one of those poor firms out there trying to hire some in-house cybersecurity expertise? Whomever you’re looking for – be it a senior representative, like CISO or CTO, or an IT administrator – we bet you’re having a hard time.

Even firms like TBG Security, where we can offer cutting-edge expertise, training and tools as well as a competitive remuneration packages, have to look really hard to find serious cybersecurity talent.

Want to know you ...

Read More →
0

NYDFS propose new cybersecurity regulations, effective Jan 1 2017. Here’s what you need to know

Posted by:

Last month, the New York State Department of Financial Services (NYDFS) put forward a proposed regulation designed to impose new rigorous cybersecurity requirements on banks, consumer lenders, money transmitters, insurance companies as well as some financial service providers in New York State.

The State has indicated that securing both New York’s financial services firms and its consumers is the main priority. The aim is to lower the risk posture in light of ...

Read More →
0

Social engineering series: the psychological norms exploited by fraudsters

Posted by:

Be nice.
Be helpful.

These life lessons are ingrained into most of us early on, and, sadly, it’s one of the reasons why many social engineering tactics are successful.

Social engineers manipulate targets into saying or doing things that will provide the desired information, which could be login information or sensitive data like customer lists, development plans or company strategies.

In order to control these ingrained friendly and helpful behaviours – by which I mean being able to identify situations that do not ...

Read More →
0

Want to outsource your IT security? 43 questions to ask

Posted by:

When it comes to outsourcing IT security, there is no one size fits all.

In the last blog post, Is outsourcing your IT security right for your organization, we looked at why some companies choose to outsource their IT security requirements.

Here, we are going to find out how you identify a good IT security firm.

IT security is specific to every organization. It depends on what assets you are trying ...

Read More →
1

Is outsourcing your IT security right for your organization?

Posted by:

Imagine you are running a large, swanky five-star hotel where guests expect to pay for luxury services. You might conclude that having full-time medical doctors on staff is worth the investment.

However, were you running a leaner hospitality operation, the associated costs of full-time doctors would simply be prohibitive, putting your business under unnecessary financial strain.

Now compare this scenario to that of a growing business needing to secure its systems, data and users from unauthorised access and malicious software.

For a few ...

Read More →
0

How to provide IT security training that works

Posted by:

All IT teams in medium to large organizations know that they should be providing regular IT security training to staff members. Small businesses should be doing it too, but might not be as aware of the need for cybersecurity training for non-IT staff.

Thing is, other jobs always seem to get in the way. Firefighting system availability, authentication, confidentiality and security issues means that training often drops down the priority list.

Even in security-conscious organizations, months, and even years, can pass without ...

Read More →
0
Page 5 of 7 «...34567
})
SEC Cybersecurity Exams