Author Archives: Cindy Kaplan

Why You Need to Take an Active Role in Your AWS Cloud Environment – One of the Largest Data Breaches

CLOUD ENVIRONMENT: The Capital One incident is one of the largest data breaches of all time, involving 100 million credit card applications and 140,000 Social Security numbers;  the bank’s stock market price took an immediate hit as company executives and IT personnel began scrambling to implement the firm’s incident response plan.

Migrating Your Legacy Firewall to a Next Generation Firewall

Every organization today needs a multi-layer security strategy to protect its enterprise from the multitude of cyber security threats that exist today;  While one cannot underestimate the importance of an email security gateway, web filtering solution, or endpoint protection system, there is no question as to the prominence of an enterprise firewall.

Does Colorado Protections for Consumer Data Privacy Affect You?

If you are a business in the United States, or anywhere for that matter, its time to start taking notice at where your consumers are located; Because compliance regulations such as those implemented by the European Union, California and Colorado may apply to your organization if you hold the personal information and data of people […]

Cyber Security Policies & Strategies Forum: SCPHCA

HALOCK Security Labs led the Cyber Security forum for the South Carolina Primary Health Care Association (SCPHCA). Managing consultants, Tod Ferran, CISSP, QSA, ISO 27001 Lead Auditor, and Glenn A. Stout, Ph.D., CISSP, CISM, GSEC, PMP presented on hot topics.

Recent Changes and Amendments to Cybersecurity Compliance Acts in California, Colorado, and New York

As we have outlined in prior articles, states such as California, Colorado, and New York are actively implementing regulations that will enforce compliance regulations concerning the management of personal information with reasonable security.  Like cybersecurity itself, legislation is a dynamic process and states continue to tweak and add amendments to the existing laws.

Insufficient Vendor Reviews = Rampant Third-Party Breaches

According to a survey conducted by the Ponemon Institute in 2018, 59 percent of companies have experienced a third-party breach of some type.  Despite the high prevalence of these incidents however, only 16 percent say they effectively mitigate third-party risks.

1 29 30 31 32 33 41