icon

Articles by tag "security"

5/6/2021 Compliance

Why comply with CTPAT?

4/29/2021 Compliance

Ask Our VP of Compliance: April 2021

Ok, so imagine you’ve been breached and there is your customers’ information flying all around the internet, and not a darn thing you can do about it. Even worse, there is a lawsuit against your company for the breach and it is not looking good. Thankfully, you had the good sense to get good commercial liability insurance. 

You’d probably imagine that your company may yet weather this storm that is coming. You’re covered, right?

3/29/2021 Compliance

Virginia Consumer Data Protection Act

3/3/2021 Edgy News

Digital Edge together with ISACA-Kyiv chapter Hosts First-Ever American-Ukrainian Privacy and Compliance Cyber-Summit in Kyiv, Ukraine

1/22/2021 Compliance

Working with PHI (Personal Health Information) – extra caution is required – the government is watching

9/25/2020 Newsletters

Tips on Securing Your O365

3/25/2020 Compliance

Ask Our VP of Compliance: March 2020

Lately, and for good reason, the top thing on people’s minds has been the COVID-19 Coronavirus. Any change from normal operations will inherently be less secure, because often the processes are unfamiliar and have not been ironed out to the extent that a company’s normal operations have been. In a situation like we are facing now, with widespread teleworking, a company’s prime security concern should be the correct implementation of a strong teleworking policy.

2/25/2020 Compliance

Ask Our VP of Compliance: February 2020

The importance of risk training. 

1/29/2020 Podcast

Risk Driven IT Organization

Keith Barry explains the importance of being a risk driven IT organization and breaks down the 7 steps of how to successfully become one. Based off of the full article online: https://knowledge.digitaledge.net/compliance/risk-driven-information-technology-organization/

7/26/2019 Compliance

Ask Our VP of Compliance: July 2019

A big misunderstanding we see every day when working with clients is that security can be ensured by buying a device, or implementing a software, or changing one small thing. However, security is an ongoing process- it's an attitude. With constant threats emerging, IT security governance is imperative. Our VP of Compliance dedicates this edition to fully understanding IT Security Governance! 

Let's talk: 800-714-5143

Speak to a specialist