article thumbnail

GUEST ESSAY: Why internal IT teams are ill-equipped to adequately address cyber risks

The Last Watchdog

The SEC’s incoming rules on handling cybersecurity are sweeping to say the least, ranging from 24/7 real-time monitoring to new documentation requirements to new security and vulnerability scanning and remediation requirements. This comes after the second highest year of enforcement actions from the Securities and Exchanges Commission (SEC).

Risk 234
article thumbnail

GUEST ESSAY: A roadmap for the finance teams at small businesses to improve cybersecurity

The Last Watchdog

For example, your accounting technology should have features that work to protect your data, like internal controls, multi-factor authentication, or an audit trail that documents change to your data. These back-ups can also be used to form a disaster recovery plan in the event of a natural disaster. Stay educated.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Gimmal Partnership with NNIT Brings Life Science Customers an Accelerated, GxP-Capable Information Governance Solution

Gimmal

NNIT has deep life sciences expertise, specifically within the compliance and validation arena, so we know how important it is to document and keep immaculate records. Join Gimmal and NNIT for an Educational Webinar NNIT and Gimmal will be co-hosting an educational webinar in March 2024, more details about this will be published shortly.

article thumbnail

Court Upholds Decision Not to Compel Plaintiff to Produce Unredacted Narrative of Events: eDiscovery Case Law

eDiscovery Daily

29, 2019) , Indiana District Judge Tanya Walton Pratt, stating “[t]o invoke schoolyard vernacular: no do-overs” , denied the defendant’s objections to the Magistrate Judge’s decision not to compel the plaintiff to produce versions of an unredacted narrative of events associated with his hotel stays and interactions with hotel staff.

article thumbnail

Using digital preservation in real time to document the global pandemic for future generations

Preservica

Marta Crilly, Archivist for Reference and Outreach at City of Boston explains how the team has been highly focussed on documenting how the city’s government is responding to the COVID-19 pandemic. The main focus of the project has been to specifically document the experience of city workers, officials, and the city governments response.

article thumbnail

President Biden Issues Executive Order Protecting Privacy of Reproductive Health Data

Hunton Privacy

The FTC has the power to enforce its existing Health Breach Notification Rule, issued over a decade ago, which applies, in relevant part, to health apps and connected devices, and requires entities covered by the Rule to notify consumers and the FTC (and in some cases, the media) in the event of a breach of unsecured identifiable health information.

Privacy 112
article thumbnail

National Safety Council data leak: Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organization

Security Affairs

On its digital platform, NSC provides online resources for its nearly 55,000 members spread across different businesses, agencies, and educational institutions. Also, the credentials could have been used to gain initial access into corporate networks to deploy ransomware, steal or sabotage internal documents, or gain access to user data.

Passwords 138