Management, compliance & auditing

How to Comply with GDPR Privacy Regulation in 6 Steps

Introduction In recent years, data breaches involving personally-identifiable information (PII) scaled to unprecedented numbers. The Equifax case alone affec

What Employers Need to Know About Workplace Monitoring and Employee Privacy

Introduction Businesses are heavily reliant on technology to complete their day-to-day operations, and employees need to use computers, laptops, tablets and

How to Protect User Data with the Privacy by Design Framework

The Privacy by Design framework (PbD) was first introduced by Dr Ann Cavoukian, Information and Privacy Commissioner of Ontario, in the 1990s. PbD “… advance

A brief guide to GDPR compliance

The European Union (EU) has a new data protection law – the General Data Protection Regulation (henceforth "the GDPR" or "the Regulation") will replace the o

10 things employers need to know about workplace privacy laws

In today's fast-paced business world, a lot of job-related duties can be done virtually, or either in a brick-and-mortar office. Employees can use their Smar

Top 5 email retention policy best practices

Email retention policies are no longer just about conserving space on your Exchange server. Today you must take into account how your email retention control

Expert Interview: Security & IT Risk Management Best Practices

There is a certain correlation between a risk and an issue. To put it in simple terms, an issue is the result of a risk being realized. Therefore, risk manag

Understanding the Role of Threat Modeling in Risk Management

The increasing number of new security threats, breaches and regulations that have taken place in the past years has moved the process of threat modeling from

5 Steps to Conducting an Enterprise Security Risk Analysis

In the world of cybersecurity, identifying risks and how they will impact the organization is of paramount importance. In general terms, risk is comprised of

How to Break Into the Field of Security Risk Management

A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the