Every company should expect that at some point it will experience a data breach. Whether as a result of hackers, disgruntled employees, or careless acts such as losing an unencrypted phone or laptop, data breaches may subject...more
3/26/2019
/ Best Practices ,
Board of Directors ,
Chief Information Officers (CIO) ,
Corporate Governance ,
Cyber Attacks ,
Cybersecurity ,
Data Breach ,
Data Protection ,
Internal Controls ,
Popular ,
Risk Management
Start-up companies know that, when potential investors kick the tires, they will look carefully at the company’s business model and IP portfolio. These days, investors are also likely to look at whether the company is in...more
1/23/2019
/ Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Breach Plans ,
Data Collection ,
Data Privacy ,
Data Protection ,
Data Security ,
Data Storage ,
Encryption ,
Investors ,
Personal Data ,
Popular ,
Sensitive Business Information ,
Startups ,
Vendors