Remove category
Remove Analysis Remove Cybersecurity Remove Data Remove Insurance Remove Security
article thumbnail

Security Compliance & Data Privacy Regulations

eSecurity Planet

Regulatory compliance and data privacy issues have long been an IT security nightmare. And since the EU’s General Data Protection Regulation (GDPR) took effect May 25, 2018, IT compliance issues have been at the forefront of corporate concerns. GDPR-style data privacy laws came to the U.S.

article thumbnail

What Is Integrated Risk Management? Definition & Implementation

eSecurity Planet

In our examples, the clothing brand secures a segregated design team with physical locks on the doors, extra computer security to prevent digital theft, and a backup solution for their marketing data. If the marketing data computer crashes, the design company will need to respond and restore the computer and the data.

Risk 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Summer 2021 National Meeting (Summer Meeting) August 14-17, 2021. Highlights include, among others, adoption of revised risk-based capital bond factors for life insurers, amendments to SSAP No. NAIC Adopts Revised Risk-Based Capital Bond Factors for Life Insurers.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Late last year, Atrium Health disclosed it lost sensitive data for some 2.65 The culprit: lax practices of a third-party data and analytics contractor. And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. Uphill battle.

Risk 147
article thumbnail

How to Find & Choose IT Outsourcing Services

eSecurity Planet

Even a robust IT or security department will find certain tasks or projects beyond their capabilities. But ignoring issues that you lack the time or expertise for can risk operational failure or security incidents. or cybersecurity-focused trade shows (RSA Conference, Black Hat, etc.)

IT 98
article thumbnail

Global Scamdemic: Scams Become Number One Online Crime

Security Affairs

Threat hunting and adversarial cyber intelligence company Group-IB published a comprehensive analysis of fraud cases on a global scale. Insurance companies around the world are now suffering from phishing. Over the past year, an average of over 100 phishing websites were created per insurer. ” About the Author: Group-IB.

article thumbnail

Cybersecurity: Managing Risks With Third Party Companies

Cyber Info Veritas

Did you know that 63% of all data breaches are directly or indirectly linked to third party companies? Benjamin Lawsky, “ A company’s cybersecurity is only as strong as the cybersecurity of its third-party vendors ”. Let us get started with how third-party data breach occurs. What data do they use?

Risk 40