Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

May 2022

May Product Rollup: UI Redesign, Compliance Controls, and More

This month, Egnyte is excited to introduce the start of a redesign to its UI, productivity improvements around shortcuts and the API, new offerings for Advanced Privacy & Compliance and CMMC, continued improvements in governance, and a whole host of new features around course management in the Quality Document Management module for Life Sciences.

CMMC & FedRAMP: FIPS Certified vs. Compliant vs. Validated

The Federal Information Processing Standard (FIPS) 140-3 (2019) is “applicable to all federal agencies that use cryptographic-based security systems… and shall be used in designing and implementing cryptographic modules that federal departments and agencies operate or are operated for them under contract.” In other words, any organization that stores, processes, or transmits certain government information must do so in a way that conforms to the FIPS standard.

Protect CUI, FCI for Your Company's CMMC Compliance

If your company does any business with the U.S. Department of Defense, you will be required to comply with CMMC 2.0 to be considered for future contracts. It doesn’t matter if you sell a product or a service, if DoD business is only a small part of your revenue, or if you are only a subcontractor. You will still be required to comply, even if the work you do hasn’t changed. Your business needs to start building a roadmap for CMMC Level 1 or Level 2 compliance.

Top Challenges Faced in the Current Cyber Security Industry

Protecting devices, data, or systems from cyber threats is what cyber security is all about. These cyber-attacks are usually aimed at gaining access to, destroying, or stealing sensitive data, or consumers’ money and disrupting online transactions and business operations. Implementing an effective cyber security system is critical, as the task has grown increasingly difficult.

Cybersecurity Compliance and Regulations in South Africa: What Businesses Need to Know

With the Internet's widespread growth, South Africa has become quite dependent on it for economic affairs. This sharing of self-generated data is a boon to all business transactions and even social interactions. The increased dependence on the digital world raises significant concerns about cyber security. Cybercrime is a global problem that has affected South Africa, both in the private sector and in government.

What Is PCI Compliance?

Whether you’re a startup, an e-commerce company, or a large corporation, as long as you handle credit card transactions, you need to be aware of and comply with the Payment Card Industry Data Security Standard (PCI DSS). As online commerce and online payment technology continue to grow, they need to be accompanied by new rules and regulations to make sure that both the business and the customers are safe and secure.

What is HIPAA compliance?

You are subject to HIPAA compliance if your business deals with Personal Health Information (PHI) of customers. It can be a daunting process to meet the standards of HIPAA regulations. Thankfully, Kintent is here to help! In our videos, we answer what HIPAA compliance is, who needs to comply, how to get compliant, and more. Would you like to become audit ready in 12 weeks, rather than 12 months? Learn more about Kintent.

How to Protect Yourself and Detect Credit Card Fraud?

Most companies are unconcerned about credit card theft until it happens to them. If you sell online or by e-mail, your company is more likely to go bankrupt owing to fraudulent credit card orders. Given the increased reliance on plastic money, credit card theft is extremely damaging. Even consumers, fail to take basic precautions to avoid credit card theft.

3 Ways to Meet CMMC Self-Assessment Requirements

In November 2021, the U.S. Department of Defense significantly updated its Cybersecurity Maturity Model Certification (CMMC) framework to incorporate new cybersecurity requirements for DoD contractors. In particular, CMMC 2.0 Level 1 (Foundational) contractors must now perform annual self-assessments, and Level 2 (Advanced) contractors must perform annual self-assessments for selected programs.

Cybersecurity Best Practices for Small Organizations

Cyber security is an important aspect and an integral part of any online business. The layperson has little idea of what threats exist and how to protect against them. And yet, if you own a business you are almost definitely vulnerable to cyber security threats. You don’t need to be a Fortune 500 company to protect against them. By knowing what to do, you can keep your data secure and avoid breaches.

Maximize Data Privacy & Regulatory Compliance with Egnyte

In this video, you’ll learn how Egnyte helps you to identify and manage regulated content across all of your company’s data repositories. You’ll also find out how to classify data with single-click policy creation and rapidly respond to Subject Access Requests (SARs) and legal holds.

How to Choose Your SOC 2 Auditor and Go Through the Audit Smoothly

After preparing fervently to meet SOC 2 standards, one decision companies face is which auditor to choose to get certified. You need to keep in mind your choice can influence your SOC 2 certification process. Kintent is here to tell you what you should be looking for when choosing an auditor. Would you like to become audit ready in 12 weeks, rather than 12 months? Learn more about Kintent.

Biggest Challenges to Implementing ISO 27001

In today’s world where information security is fundamental to businesses to protect their systems, network and data, compliance to ISO 27001 is crucial. ISO 27001 is an internationally recognised set of standards that helps organisations manage their information security by establishing, implementing, and maintaining an information security management system (ISMS).

A Quick Guide To Information Security Programs

Broadly speaking, an information security program is a set of activities and initiatives that support a company’s information technology while protecting the security of business data and enabling the company to accomplish its business objectives. An information security program safeguards the proprietary information of the business and its customers. The Gramm-Leach-Bliley Act (GLBA) has a more specific definition of what a security information program should entail.

Data Security and Compliance in Fintech

When a leading financial technology provider began posting record success and rapid customer growth, it needed a holistic security strategy to protect its customer data and comply with regulations such as the Payment Card Industry Data Security Standard (PCI DSS) and the California Consumer Privacy Act (CCPA).

Centralized Log Management for Reporting Compliance to Management

It’s 3pm on a Wednesday, and you’re really just done with the week already. You hear that “ping” from your Slack and know that you set notifications for direct messages only, which means, ugh, you have to pay attention to this one. It’s your boss, and she’s telling you to check your email. Then you see it, the dreaded audit documentation request. This will take you the rest of today and most of tomorrow.

How Should Employees Be Trained for Cyber Security?

Cyber security risks have never been more apparent and costly. According to the survey data, the average cost to the U.S. organizations that experienced a cybersecurity breach in 2020 was approximately 8.64 million dollars per incident, up almost a half-million dollars from 2019. Rates of cyber security attacks and identity theft have significantly increased and seem to be only becoming easier for hackers and cybercriminals.

Building a Strong Business Case for Security and Compliance

Compliance is a key part of any organisation and in business terms, it is about ensuring companies of all sizes and their employees comply with existing national and international laws. In the UK the Companies Act 2006 is the main legislation that forms the primary source of company law and businesses of all sizes must ensure they adhere to it to remain compliant.

Understanding the GLBA Safeguards Rule

The Gramm-Leach-Bliley Act (GLBA) aims to protect consumer financial privacy with three provisions: the Financial Privacy Rule, the Safeguards Rule, and the Pretexting Provisions. In our previous post, we covered the GLBA Financial Privacy Rule and what financial institutions, as defined by the GLBA, need to know to be compliant.

Is It Reasonable to Deploy a SIEM Just for Compliance?

Many organizations need to meet various compliance standards, and investing in a security information and event management (SIEM) solution can often help them reach that goal. But it worth the cost and effort to deploy a SIEM solution solely for compliance? Or is there a way to maximize the value of your SIEM by strengthening cybersecurity as well as achieving compliance? This article will help you answer those critical questions.

Calligo partners with BigID to accelerate Data Privacy, Security and Governance for our clients

Today, Calligo announced that we have partnered with BigID. The BigID data intelligence platform enables organizations to know their enterprise data and take action for privacy, security, and governance. This partnership will enable Calligo to provide clients with the ability to proactively discover, manage, protect, and gain more value from their regulated, sensitive, and personal data across their data landscape.

NeoSystems Strengthens Channel Program; Names Kathlyn Gibbs to Lead Effort as VP, Partners and Alliances

TYSONS CORNER, Va., May 3, 2022 – NeoSystems, a full-service strategic outsourcer, IT systems integrator and managed services provider to the government contracting market, is strengthening its channel program and has named Kathy Gibbs to lead this effort as Vice President, Partners and Alliances.

What Is COBIT?

COBIT is an acronym for Control Objectives for Information and Related Technologies. The COBIT framework was created by Information Systems Audit and Control Association, ISACA to bridge the crucial gap between technical issues, business risks and control requirements. COBIT is an IT governance framework for businesses that want to implement, monitor and improve their IT management best practices.

Compliance does not equal security: 7 cybersecurity experts share their insights

It is often stated that security is hard. Whether it is the people, processes, and technology, or any combination of the three, security is a never ending challenge. Conversely, compliance is the opposite. Compliance is relatively straightforward. For too long, and for too many organisations, meeting a compliance standard was seen as a satisfactory way to boast of security. The competing ideologies of security versus compliance have long vexed even the most optimistic cybersecurity professional.

CMMC 2.0 Certification Costs

With the release of CMMC 2.0, and the significant changes that come with it, we have to update our cost expectations. This post covers whether CMMC is appropriate for your business, provides a cost breakdown of the 3 major effort areas, offers a rough estimate of the costs of CMMC compliance, and answers the question of whether an expert can save you time and resources.

CMMC 2.0: Jumpstart FCI & CUI Protection with Data-centric Zero Trust

Government, defense and defense industry base (DIB) must meet the demands of both the DoD and the critical infrastructure players and map to critical controls laid out in NIST 800-171, NIST 800-53, and the upcoming CMMC 2.0 to adequately protect Federal Contract Information (FCI) and Controlled Unclassified Information (CUI).