Articles by tag "data-protection"

5/12/2025 Compliance

Never Let a Breach Go to Waste: Turning Setbacks into Strategic Opportunities

In today’s digital landscape, cybersecurity breaches are an unfortunate reality for many organizations. While these incidents can be devastating, they also present a unique opportunity for companies to reassess their security posture and improve their defenses. The phrase “never let a breach go to waste” encapsulates the idea that organizations can leverage the lessons learned from a breach to enhance their security measures, increase budget allocations for cybersecurity, and ultimately fortify their operations against future threats.

10/1/2019 Compliance

The IRS is Mandating a Taxpayer Data Protection Plan

The IRS has recently issued a regulation in response to the large number of data breaches surrounding taxpayers data. It lays out the basic necessary actions needed to take to protect your data.

6/27/2019 Compliance

Ask Our VP of Compliance: June 2019

A common question topic posed to me, the VP of Compliance, from both non-IT and IT professionals alike revolve around the concept of RPO and RTO with regards to Business Continuity Management.  Recovery Point Objective (RPO) and Recovery Time Objective (RTO) are two of the most important parameters of a sound disaster recovery plan.

This month, I explain everything you need to know about RPO and RTO!