Knowledge

All Articles

11/14/2018 Compliance

Seven Firms accused of violating GDPR by Privacy International

On May 25th of 2018, GDPR Became effective, bringing a demanding standard for data protection and privacy rights for individuals from organizations around the world. Privacy International (PI), which is a charity that defends and promotes the right to privacy, accused seven firms of “disregarding data protection principles, including purpose limitation, data minimization and data accuracy”.

 

To prevent and protect other firms from being in the same situation, Digital Edge would like to state some general reminders about the law.

 

10/29/2018 Digital Edge at Work!

Digital Edge Client Appreciation Concert 2018

Digital Edge started hosting an Annual Client Appreciation Concert to show our love and support for the arts community. This being the first event, it had a great turn out! 

10/24/2018 Newsletters

Content From Your Email is Being Cached

You have your corporate email defenses lined up. While you may be using an out of the box product such as Microsoft O365 or something more sophisticated like ProofPoint – here is what you need to know.

Although you might be as safe and secure as possible you should still be aware of the vulnerablities that exist and can affect you.  

Unless users are restricted from using mobile email apps, there is nothing that can protect you. This risk extends even to disclosure of your corporate authentication. 

Click here to read about this potential threat.

10/18/2018 Compliance

Ask Our VP of Compliance: October 2018, The Scariest thing this Halloween is Audits

Cyber security is the protection of systems, networks and data from attack. Cyber security audits examine the threats, vulnerabilities and risks facing your organization and addresses mitigating these risks. When assessing your cyber security there are three key areas to take into account: people, processes and technology. Thorough audits should be performed regularly not only to protect your organization but also to comply with legislation regarding protection of personal data. Digital Edge's VP of Compliance answers the most important questions regarding audits: 

  • What is the difference between a cyber security audit and a cyber security assessment?
  • What do I need to have in place for Incident Response?
  • What if users are my Biggest Security Risk?
  • Why are Cyber Security Audits Important?
10/3/2018 Compliance

Digital Edge’s HIPAA Compliance Self-Assessment

Digital Edge’s HIPAA Compliance Self-Assessment

 

In recent years, security breaches in the healthcare industry have become a lot more prevalent. The rise in data privacy violations, specifically infringements on the security of ePHIs (electronic Protected Health Information), has put millions of health records at risk. Surely, private data such as health information must always stay protected from unauthorized exposure, which is why HIPAA compliance and is critical.

 

HIPAA, or the Health Insurance Portability and Accountability Act, was passed to set the standards for the protection of sensitive healthcare information. It involves setting administrative, technical, and physical safeguards for the security of data.

 

Unsure if you are following the law correctly? Check out Digital Edge’s HIPAA Compliance Self-Assessment here!

 

Don’t wait until it’s too late. Tomorrow starts now! Prioritize your compliance with HIPAA mandates, and establish a credible HIPAA program. Digital Edge is an expert in HIPAA standards. Our team will help to implement policies, standards and practices to cover all HIPAA requirements. 

Contact us today to further explore how our team can provide your business with an unparalleled cybersecurity  compliance solution, with our continued focus on Stability, Security, Efficiency and Compliance

9/29/2018 Compliance

US Data Breach Notification Laws- State by State

All 50 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have enacted legislation requiring private or governmental entities to notify individuals of security breaches of information involving personally identifiable information.

 

Security breach laws typically have provisions regarding who must comply with the law (e.g., businesses, data/ information brokers, government entities, etc); definitions of “personal information” (e.g., name combined with SSN, driver’s license or state ID, account numbers, etc.); what constitutes a breach (e.g., unauthorized acquisition of data); requirements for notice (e.g., timing or method of notice, who must be notified); and exemptions (e.g., for encrypted information).

9/20/2018 Compliance

Digital Edge Sexual Harassment Policy

Introduction

 

Digital Edge is committed to maintaining a workplace free from sexual harassment. Sexual harassment is a form of workplace discrimination. Digital Edge has a zero-tolerance policy for any form of sexual harassment, and all employees are required to work in a manner that prevents sexual harassment in the workplace. This Policy is one component of Digital Edge’s commitment to a discrimination-free work environment.

 

Sexual harassment is against the law. All employees have a legal right to a workplace free from sexual harassment, and employees can enforce this right by filing a complaint internally with Digital Edge, or with a government agency or in court under federal, state or local antidiscrimination laws.

9/17/2018 Compliance

Ask Our VP of Compliance: September 2018

In 2018, one thing is for certain: changes are happening—fast. Technology changes, as usual, are the focus this year as we watch new innovations unfold, new products emerge, and businesses take hold of new opportunities. However, tech isn’t the only thing changing rapidly. This year, Digital Edge’s Compliance articles have covered brand new regulations that have taken effect, which are likely to have impacted your business. 

 

Businesses must be aware of new laws and policy changes, no matter where they operate or what kind of business it is. A recent article published by Business News Daily says it best, “Staying apprised of policy changes could be the difference between gaining a competitive edge or falling behind due to compliance issues or strategic missteps.”

 

But, what about IT laws and regulations that already exist? Are you aware of what guidelines you should already be following? That is why, Digital Edge's VP of Compliance breaks down all the laws in this months Ask Our VP of Compliance!

9/12/2018 Newsletters

Hurricane Florence: A Message from the Digital Edge Disaster Recovery Team

By tomorrow, Hurricane Florence is expected to make landfall in North Carolina, South Carolina and Virginia. With strong winds predicted up to 130 mph, the storm should make its first landfall by noon on Thursday, September 13, 2018. While the storm’s path is still progressing, over 1 million people are facing mandatory evacuations.

Over the past few days, the Digital Edge Disaster Recovery Team has been virtually migrating many of its Carolinian and Virginian clients with onsite systems to virtual servers in the New York Area. Digital Edge is ensuring that business data, backups, applications, and server images are safely stored off-site. If requested, Digital Edge can coordinate the process of moving any critical systems to our Cloud environment.  

If you feel that your business is in need of Digital Edge’s Disaster Recovery assistance in preparing for Hurricane Florence, please contact the Digital Edge team

9/7/2018 Newsletters

Why Cyber Security Insurers Deny Your Incident Claims

You might’ve configured your email logging system incorrectly. How would you know until you got hacked? It’s fine -  you have cyber security insurance that will cover you right? WRONG. Recently, an undisclosed client experienced a major breach and was denied of their claim. Having cybersecurity insurance doesn't guarantee the safety net you might think it does -  not unless you meet the basic security guidelines.  Digital Edge’s Cybersecurity and Compliance experts are available to help you meet these standards in addition to protecting your infrastructure.