For any business leader or CIO, navigating the world of cybersecurity insurance can be very complicated. It seems as if there are often more questions than answers, it can be difficult to know who you need to speak to in order to get what you need. This article will attempt to provide some direction, point out a few of the pitfalls, and help you to ask the right questions within your organization.
ProCircular Team
Recent Posts
Cybersecurity Insurance for C-Level Executives
Topics: Cybersecurity, cybersecurity insurance, insurance, it risk assessment
As strong as the weakest link
You probably know that having network security in the workplace is important, but what about your home? Most people use their home internet connection for everything from finance to important personal correspondence, all of which should be secured to the individual. In this blog post we will explore some simple tricks that will help you make your home network more difficult for intruders to access.
Topics: Cybersecurity, consumer security, Data Security
Personal Privacy in the Wake of Reoccurring Data Breaches
It seems like every other week there is a new data breach in the news. Some notable incursions of 2016 were LinkedIn, Yahoo, and a new one as of December 5th, DailyMotion (a video hosting service).
Topics: Data Breach, Data Security, Personal Privacy, Personal Data Protection
The Significance of Data Ownership and Classification
Data ownership and classification are usually initiatives companies think about much after implementing many other layers of controls like firewalls, patching, or antivirus. But because of legislation like Health Insurance Portability and Accountability Act (HIPAA) and the US Family Education Rights and Privacy Act (FERPA) companies are required to know what data they possess and assure they are securing it. Most organizations retain large quantities of data and some even call it “big data” but many do not have the certainty of what type of data it is, what are the data elements, where it is stored, when it should be destroyed, and how to protect it. This article will explore those elements and highlight the importance of data ownership and classification.
Topics: Cybersecurity, Data Classification, Information Security, Data Retention, Data Security, Data Protection, Data Ownership