The Sedona Conference Draft Commentary on Proactive Privacy and Data Security Governance
On June 24, 2020, an online panel of WG11 drafting team members discussed their June 2020 draft Commentary ,
On June 24, 2020, an online panel of WG11 drafting team members discussed their June 2020 draft Commentary ,
As businesses re-open and take cautionary measures to prevent spread of COVID-19, many organizations have incorporated thermal scanner policies onsite.
HALOCK partnered with a Manufacturing company to recover data exfiltrated from a ransomware attack
HALOCK contained and eradicated a ransomware attack on a manufacturing company’s internal assets and set a wholistic plan to mitigate future risk through enhanced MFA, policies, and training.
In today’s highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real […]
As technologies advance in our fast-paced world, our activities and information are being constantly collected and monitored – so what is ‘privacy’?
If you are a business in the United States, or anywhere for that matter, its time to start taking notice at where your consumers are located; Because compliance regulations such as those implemented by the European Union, California and Colorado may apply to your organization if you hold the personal information and data of people […]
At the CAMP IT Conference, HALOCK’s Todd Becker, Principal Consultant, and Steve Lawn, Senior Consultant, presented “KNOW WHERE YOUR NEXT ATTACK IS COMING FROM: Attack prediction and resource prioritization using community-sourced data.”
Reasonable and Appropriate Data Security – An interesting case that the FTC filed recently (June 26, 2012) against a well-known hotel chain. (Names omitted for the purposes of this blog.) Notice the similarities to the PCI DSS requirements.