Selective, granular SharePoint backup and recovery can help organizations to meet security standards, comply with industry regulations, and reduce liabilities. Learn why a blanket backup solution is not always the best option.
Cybersecurity is a top priority for organizations. All it takes to infect a network or steal valuable data, is one wrong click by an employee. While employees seem to have good knowledge of basic cybersecurity practices, there are considerable security blind spots which leave the employee and organization vulnerable to breaches. Spanning helps to identify red flags and vulnerabilities in security awareness training for employees.
There is no official “certification” in HIPAA recognized by the Federal government, therefore MSPs who work with healthcare providers or payers need to educate themselves on HIPAA compliance. Here are the top 5 things MSPs should know about HIPAA.
From hurricanes, errant employees, malware to even a rodent with an appetite for cables — the likelihood of an organization suffering data loss has never been greater. An organization’s best defense is to plan for business continuity and disaster recovery by using processes that guide organizations to possibly prevent and/or better manage an (unpredictable) disruptive event.
On June 28 2018, California Governor Jerry Brown signed into law AB 375, the California Consumer Privacy Act (CCPA) of 2018. The statute, seen as one of the toughest privacy laws in the United States, will require companies to tell California residents what information is being collected and how it’s used. You have 18 months to get ready.
A good governance plan is essential to helping your organization achieve its goals and mission. In addition, a good governance plan is key to maintaining risk management and compliance. In this blog post, you’ll learn practical definitions of what governance is — and what it isn’t — and why and how to go beyond good governance to data protection.
Ransomware attacks are increasing, getting more sophisticated and sparing no industry. In this blog we examine both sides of a ransomware attack — ways to prepare a solid defense (or offense) to prevent an attack and pointers to repair the damage if you do suffer an attack.
We’ve made it all the way to number 10 in our blog series, and just in in time for Friday, May 25, 2018, the date the GDPR will become enforceable. But relax, we’re here to provide you with peace of mind in the last blog of our GDPR series with tips and pointers to keep you GDPR compliant — on May 25, and beyond.