VCDPA And Security Requirements – New Regulation In Virginia Imposes Rules On Data Security And Backup
What is the VCDPA? VCDPA stands for Virginia Consumer Data Protection Act that allows consumers to access their data and gives them a right to request to delete their personal information by businesses. It also requires businesses to secure consumers’ data through several data protection assessments that companies need for targeted sales or advertising purposes. […]
HIPAA Compliance And Backup Requirements – How SylLab Can Help Your WordPress Website To Stay Compliant
What is HIPPA? The term HIPAA is known as Health Insurance Portability and Accountability Act. It is the United States legislation and is responsible for providing data security and privacy for safeguarding all medical information. In recent years this law has emerged into greater fame because of huge data leakage by ransomware attacks and cyberattacks […]
Risk Of Losing Cyber Insurance With No Backup – In Case Of A Data Breach, Your Organization Will Be Liable.
What Is Cyber Insurance? Cybersecurity insurance alleviates losses from many cyber incidents such as business, data breaches, and network damage. Robust cybersecurity insurance can help in reducing the variety of cyberattacks by: Promoting the adoption of precautionary measures in return for more coverage. Supporting the implementation of good practices by basing premiums on the self-protection […]
Security is expensive and difficult
Keeping data private and secure has become increasingly challenging for companies. Data usually has to be stored on behalf of users on a server or cloud service somewhere. Responsibility for security and privacy lies with the company storing the data. This involves several hurdles. First of all, data breaches have become extremely common. A black […]
HIPAA, GDPR, CCPA Compliance for Telemedicine Start-ups
Non-compliance is very expensive. Organizations are stepping on thin ice when it comes to building applications that process Protected Health Information (PHI). There is a lot of overhead associated with building and implementing HIPAA-compliant systems. Understanding legal nuances and their technical implications is a mountain to climb. The risk of non-compliance with regulations is simply […]
The cost of innovation for CISOs
RSA conference was slow this year. There was less noise, less disposable gadgets and fortune wheels spun slower. San Francisco was still flooded with people and hotel prices spiked because of the limited space. Some panelists were better prepared than others. There might be a shift from technology and business to simple tube-marketing at RSA. […]
The 97%
97% of all data breaches happen on unencrypted data (Gemalto Report). This number can tell us a lot. Only 3% of data breaches happen on encrypted data. Companies don’t encrypt the data or often fail at implementing it correctly. Why? There are many reasons why that happens and most important are lack of awareness and […]
Introduction to Modern Cryptography
A Long History of Mathematical Trust Cryptography is not a new field. It has existed for thousands of years. There has always been a need to keep secrets and encrypt messages, mainly for military and political reasons, but also for commercial and industrial confidentiality. However, the goals and methods of cryptography have evolved over […]
Information is now even more valuable than cash
In a sleepy town of Laguna Niguel, California there is a dynamite explosion at United California Bank, it’s March 24th, 1972. Burglars led by Amil Dinsio break into a concrete reinforced of the vault stealing $9 million ($55 million today). Hollywood style investigation and dirty laundry lead to the arrest and conviction of the masterminds […]