How to Secure E-Commerce

Posted by & filed under List Posts.

How to Secure E-Commerce

Digital attacks are, of course, of many different approaches and scopes; and the value of data that is stolen also is across a broad spectrum. While that case-by-case diversity exists, there is a commonality of being at risk across all businesses. Incredibly, a report last year revealed that half of small businesses in the United… Read more »

What is GDPR Compliance?

Posted by & filed under List Posts.

What is GDPR Compliance

Is your organization ready for the May 25, 2018, effective date of the General Data Protection Regulation (GDPR)? This short guide gives you a sense of what guidelines it contains, along with whose data it safeguards and who will have to follow the rules.   Understanding the GDPR   5, 4, 3, 2, 1… Second… Read more »

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

Posted by & filed under List Posts.

How the IT Threat Landscape Will Change in 2018 – Part 2 of 2

<<< Go to Part 1   #6 – Competition with government for identity verification   One thing that should be learned from the compromise of Equifax, according to the Forrester report, is that individual organizations should not be put in the position of providing reliable verifications of identities and protecting the information of consumers –… Read more »