Blog
Page 82 of 152
What is Risk Management in Hospitality?
The hospitality industry has been hit hard with challenges during the COVID pandemic. For a sector that prides itself on customer service and adapting to change, the last few years have been rough. As a sector, hospitality includes restaurants, bars, and hotel businesses; but as well as other types of lodging and travel businesses, such […]
Tags: Hospitality, Risk Management
Why is PCI Compliance Important to an Organization?
Payment Card Industry (PCI) Data Security Standard (DSS) compliance is important to organizations that want to accept, transmit, process, or store payment card data. Since almost every business accepts credit or debit cards as payment, PCI compliance has a real appeal for data security. The control measures laid out in the PCI DSS reduce the […]
Tags: PCI
November 27, 2021
What Is Governance, Risk, and Compliance?
The phrase “governance, risk, and compliance” (GRC) was first introduced in the early 2000s by the Open Compliance and Ethics Group (OCEG). Since then, the concept has fundamentally changed how businesses operate. Although GRC is not a revolutionary idea by any means, it is integral to assuring that organizations can achieve, and maintain, optimal business […]
November 23, 2021
Top Ways to Control Business Risk
Businesses and other organizations are exposed to all types of risk. Anything threatening a company’s ability to achieve its financial, operational, or compliance objectives is considered a business risk. Sometimes an organization’s management or employees create situations that increase risk exposure. Usually, however, external factors are the typical causes of risk, such as natural disasters, […]
Risk Management and Budget Planning
Every company needs to undertake a certain amount of planning if it wants to grow. This includes not only strategic planning to expand operations and increase profits; executives also need to plan for risks they might encounter so they can anticipate and avoid threats. It makes sense, therefore, to integrate this planning throughout your organization […]
What Are HIPAA Storage Requirements?
If your company is at all related to the medical field, it’s subject to HIPAA compliance requirements. The protected health information (PHI) defined by HIPAA is both sensitive and valuable to thieves, and electronic protected health information (ePHI) is particularly vulnerable. To comply with HIPAA, your data storage must be designed with these requirements in […]
How You Should Rank Cybersecurity Vulnerabilities
Discover the best practices for ranking cybersecurity vulnerabilities so that you can eliminate them. If there’s one thing you can expect from cybercriminals, it’s that they’re always looking for new ways to locate and exploit your organization’s vulnerabilities. The National Institute of Standards and Technology (NIST) defines a vulnerability as a “weakness in an information […]
November 22, 2021
Steps to Creating a Cybersecurity Disaster Recovery Plan
Create a successful cybersecurity disaster recovery plan using these steps from the team at Reciprocity. When disaster strikes, your organization needs to be prepared, and having a plan in place will help you resume operations as quickly as possible. From natural disasters to cyberattacks, the number of unpredictable events that could cause a disruption to […]
3 Questions with Michael Maggio on Risk Intellect
Meet Risk Intellect Reciprocity® Risk Intellect is a new risk-analysis tool that, when used with the Reciprocity ZenGRC® platform, provides insight on the impact your compliance programs have on your cyber risk posture. By mapping your current compliance control assessments to cyber risks, it provides immediate context and visibility into which cyber risks and controls […]
Page 82 of 152