Data theft can devastate any company, resulting in lost profits, regulatory enforcement, litigation, and reputational damage that can be difficult to overcome. Every organization must protect its customer data and... Read More
Blog
How to Implement Third-Party Risk Management Policies
Third-party risk management needs a new approach because (let's be honest here) the current approach doesn't work. According to Gartner, 83 percent of legal and compliance leaders identify third-party risks... Read More
Top Security Risks of Cloud Computing & How to Avoid Them
The need for versatile and affordable solutions for storing and processing data in enterprises makes cloud computing an increasingly attractive IT strategy. Cloud computing provides flexible and easy-to-use solutions. It... Read More
How Compromised Credentials Could Put Your Business at Risk
Lost or stolen user access credentials are a chronic, widespread cause of cybersecurity breaches. By mid-2020, 80 percent of hacking-related breaches and 77 percent of cloud breaches involved the use... Read More
Notes on Cybersecurity and Operational Risk
This article first appeared on radicalcompliance.com December 12th, 2021 Last week one of the country's top banking regulators published its semi-annual report on risks to the financial system, and to... Read More