Blog
Page 84 of 152
What is a Privacy Impact Assessment?
The International Association of Privacy Professionals (IAPP) defines privacy as “the right to be let alone, or freedom from interference or intrusion.” Many people and cultures consider privacy to be a fundamental right, the foundation upon which many other human rights are built and recognized. Information privacy is specifically the right of a person to […]
November 17, 2021
What Is Cyber Situational Awareness?
Digital transformation has created enormous opportunities for businesses to grow and prosper. It has also brought great risk, foremost from criminals armed with sophisticated cyber-attack tools. To ward off those attackers, and to keep critical infrastructure and data safe, organizations must protect themselves with the right tools, technologies, and procedures — but first the organization […]
Top Vendor Tiering Strategies to Mitigate Cybersecurity Risks
All organizations rely on vendors to function in today’s dynamic landscape while achieving peak operational efficiency, cost-effectiveness, and economies of scale. A growing third-party network can yield significant benefits for organizations — but it also results in greater risk. A robust third-party risk management program (TPRM) is crucial to mitigate that risk and maintain business […]
What Is a Cybersecurity Incident Response Plan?
Global cyberattacks increased by 29 percent in the first half of 2021 compared to 2020, and we can assume that cybercriminals and hackers won’t stop their malware and ransomware attacks any time soon. A strong cybersecurity strategy is vital to reduce losses from those attacks, and a robust incident response plan should be a part […]
Bluegreen Vacations Selects ZenGRC for Compliance; Usage Grows to Address IT Risk and Audits
Bluegreen Vacations believes in the power of vacation. A leader in vacation ownership, the company’s 222,000+ owners and guests enjoy vacation experiences across a range of exciting destinations. Business Challenge Manual processes were hindering visibility and efficiency around SOC and SOX compliance, with the CIO and Chief Accounting Officer pushing for improved insight. Solution ZenGRC […]
November 16, 2021
Cyber Risk & Indicators of Compromise (IOCs)
Everything you need to know about indicators of compromise including how you can identify them to better protect your business. Protecting your business against a cyberattack means diligently monitoring for activity that could indicate an attack is in progress or has already occurred. Locating these pieces of forensic data (such as data found in system […]
November 12, 2021
What Is Business Continuity and Disaster Recovery?
Data security is the practice of protecting data from unauthorized access and corruption throughout the data’s lifecycle. Implementing adequate data security practices protects businesses against cyberattacks that jeopardize company data, assets, finances, and reputation. One part of data security, however, is to plan for the worst: a breach of some kind, with the attendant disruption […]
November 11, 2021
5 Most Common Cyber Attack Vectors & How to Avoid Them
The rapid pace of technological progress has let companies around the world benefit from operational improvements that lower costs. This progress, however, also brings risks that companies must take into account to protect their stakeholders. Cyber-threats are executed by cybercriminals using various means to gain access to an organization’s digital infrastructure. Cyberattack vectors are the […]
Bot Malware: Protecting Your Business from Botnet Attacks
Cyberattacks can take many forms. Those intended to disrupt a business often happen as denial of service (DoS) attacks, and its even more disruptive cousin, the distributed denial of service (DDoS) attack. Such attacks are often executed by a botnet, which is a network of infected machines or connected devices at the order of a […]
How to Map Controls in Risk Management
Strong, reliable internal controls are an indispensable element of risk management. Properly functioning controls help to identify risks that could cause suffering, damage, harm, or other losses to your organization. To implement those controls, organizations typically use a control framework to guide their efforts. A critical part of that exercise, in turn, is control mapping […]
November 9, 2021
Page 84 of 152