Blog
Page 54 of 152
Employee Spotlight: Dan Kiehl, Compliance Analyst
Reciprocity is committed to providing the industry’s leading compliance and risk management solutions. So, it should come as no surprise that compliance and risk management play a big role inside the company as well – with leaders like Compliance Analyst Dan Kiehl leading the way. The Journey to Compliance Dan didn’t always want to be […]
November 10, 2022
Compliance Does Not Equal Security: How to Take a Proactive Approach to See, Understand and Act on Risk
Compliance is the typical starting point in protecting your organization. After all, it’s a “must-do,” and failure to comply can result in fines and other regulatory action. But focusing exclusively on compliance can leave you short-sighted and expose you to risk. So how can you beef up your cybersecurity game? By taking a broader, risk-based […]
Internal Controls to Implement for Data Privacy
Thanks to the endless parade of data breaches that fill news headlines, discussions about data privacy have become commonplace in the corporate world. That’s good news; corporate organizations have lots of internal controls they could put in place to reduce the damage a breach can cause. As a business objective, data privacy is concerned with […]
Signs You May Be Vulnerable to Supply Chain Attacks
One of the most notorious cybersecurity attacks to strike through the corporate supply chain happened in 2020. That’s when criminals successfully installed malware into the Orion software product sold by SolarWinds, which then infected thousands of SolarWinds’ corporate customers around the world. Due to the level of stealth employed by the attackers and their success […]
Consumer Data Privacy and Future Readiness: Developing a Meaningful Growth Outlook
To get a sense of how consumers feel about the privacy of their personal data, a McKinsey survey from 2020 offers some telling insights: Recent high-profile consumer-data breaches have eroded consumers’ trust in organizations 87 percent of consumers will not do business with a company that has weak security practices 71 percent will sever their […]
Most Common Types of Cybersecurity Vulnerabilities
In 2021, Microsoft patched the Windows Print Spooler remote code execution vulnerability, a weakness in the Microsoft operating system that allowed attackers to execute code with administrator privileges on any computer where the Windows Print Spooler service was active. This serious OS security exploit, known informally as “Print Nightmare,” left users of Windows 10, Windows […]
November 9, 2022
Compliance in Healthcare
Healthcare is one of the most highly regulated industries in the business world. Meeting those regulatory compliance obligations is challenging and complex, because of both the evolving regulations and the need to balance high-quality patient care with stringent privacy and security. In this article we’ll discuss the importance of a compliance program in healthcare, key […]
Make Sense of Recent NIST Updates For the Healthcare Industry
A constant in the world of cybersecurity governance, risk and compliance management is the steady stream of new frameworks, regulations, laws and guidance that must be reviewed, understood and adhered to. It’s easy to feel overwhelmed and frustrated with this process, but we’re here to help make the job a bit easier for you. We […]
Why Security Health Is More Important Than Security Maturity
One of the things I love most about working in security is that things are constantly changing. Yup, you read that correctly. I love changes! Learning new things, challenging past assumptions, and expanding my understanding and abilities are profoundly satisfying. I once heard myself referred to as a life-long learner and thought, isn’t everyone? And […]
November 2, 2022
Get Ahead of Threats by Surfacing Unknown Risks Lurking in Blind Spots
Many organizations believe that if they comply with cybersecurity and governance regulations, they are safe from attackers. Nothing could be further from the truth. Cybercriminals don’t care if you’re compliant or not. They are highly motivated and focused on making money by accessing your high-value information, profiting from ransomware payments and disrupting your business. And […]
Page 54 of 152