Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RiskOptics

How Can You Protect Your Company From Hackers?

According to a Clark School Study at the University of Maryland, there is a cyber-attack every 39 seconds on average. If you are running a small business, you have more reason for concern as further studies reveal that 43 percent of hacker attacks target small businesses. With such alarming cybersecurity stats, it is vital for you to learn how you can protect your company from bad-actors.

What is the Primary Objective of Data Security Controls?

Effective information security management requires understanding the primary concepts and principles including protection mechanisms, change control/management, and data classification. However, those terms may feel overwhelming at first leading many businesses to follow compliance requirements blindly without fully understanding whether they effectively secure their systems, networks, and software.

Higher Education Security Breaches To Learn From

Higher education finds itself facing a threat to its financial security even larger than student retention – data breaches. As colleges and universities begin to adopt mobile technologies, they also find themselves increasingly targeted by malicious actors. Understanding the recent security breaches impacting the industry can educate institutions about information security.

Student Data Privacy Laws by State

Most educators know about the federal student data privacy laws such as the Family Educational Rights and Privacy Act (FERPA) administered by the US Department of Education. However, modern schools increasingly adopt new technologies such as cloud service providers for managing everything from homework assignments in Google Drive to education data in records management data systems.

Understanding the California Privacy Law Requirements

Another year, another privacy law on the horizon. In 2018, the big push for compliance with the European Union General Data Protection Regulation (GDPR). In 2019, companies are reeling from the new law governing data protection passed by ballot initiative. The California Consumer Privacy Act (CCPA) intends to place on companies who collect California residents’ personal information. But the question remains, in the morass of regulatory writing, “What is the CCPA?

Understanding the Types of Risk in the Oil & Gas Industry

Defined as critical infrastructure, the oil & gas industry increasingly faces cybersecurity risks as nation-state cybercriminals attempt to undermine other countries. The integration of information technology (IT) systems into operational technologies (OT) creates a unique threat to the oil and gas industry that places both the companies and the public at risk.