
Posts about:
Insights (2)


Simple Steps for Ransomware Risk Mitigation
Simple Steps for Ransomware Risk Mitigation
Ransomware is one of the most prevalent threats an organization may face, regardless of their size or...

Defining the Core Elements of Your Cybersecurity Strategy
Defining the Core Elements of Your Cybersecurity Strategy
The events of 2020 have caused organizations to consider how their business models may...

How to Build a Culture of Cybersecurity
How to Build a Culture of Cybersecurity
The number and severity of cyber-related threats on organizations is increasing and is expected to continue to...

Updating your Data Maps Post-Schrems II
Considerations for Updating your Data Maps Post-Schrems II
In July 2020, after the historic ruling in the Schrems II case, invalidated the EU-US Privacy...

Are You Getting the Most Out of Your Data?
Are You Getting the Most Out of Your Data?
Imagine if you went onto Amazon and there was no search engine, no history of what you viewed, no semblance to...

A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
The Schrems II Ruling
Following the precedent of Schrems I, in...

The Top Potential Implications of the California Privacy Rights Act (“CPRA”) of 2020
A Closer Look at Implementing EU Model Clauses and Binding Corporate Rules (“BCRs”)
On June 24,2020, the state of California announced that it...

Increasing the Impact of the Privacy Office with “Privacy Champions”
Increasing the Impact of the Privacy Office with “Privacy Champions”
With growing changes in data privacy laws and the increased emphasis on...

Introducing the Proposed U.S. Federal Privacy Bill: “DATA 2020”
Introducing the Proposed U.S. Federal Privacy Bill: “DATA 2020”
On June 18th, 2020, U.S. Senator Sherrod Brown (D-OH), ranking member of the...