Search Results
8402 result(s) for
-
Hospitality Management - Loyalty and Cybersecurity: Don’t Risk a Breach
Mar 16, 2016
With intelligent loyalty programs there is an increased cybersecurity risk because customers are asked to share a significant amount of personal data. Loyalty program fraud occurs in 3 main ways. Here are some practical steps in minimizing cybersecurity risk.
-
Nov 3, 2016
The financial services industry, including private equity, has been a prime target for hackers. Yet despite awareness that cybersecurity is a must-have, general partners are often left wondering how best to approach it.
-
Jun 15, 2016
Cybersecurity is an enterprise business risk for all law firms, and includes everyone in the organization. Law firm IT and administrative professionals are increasingly under pressure to ensure that up-to-date cybersecurity and privacy standards are applied to their systems.
-
When Your Reputation Gets Short-Circuited
Nov 14, 2016
'It takes 20 years to build a reputation and five minutes to ruin it.' That’s a quote from someone who knows a little bit about business: Warren Buffett. There are proactive steps a company can take to secure its data and protect its reputation.
-
The 6 Keys to an Effective Cybersecurity Program
Mar 8, 2017
Securing data against cybercrime can affect everyone throughout the organization. Leadership must make it a priority properly define the program, provide training, oversee and audit the program, and mandate a review via risk assessment.
-
Jun 10, 2016
The National Association of Insurance Commissioners is seeking to improve cybersecurity regulation. The NAIC Cybersecurity Task Force has been reviewing model laws on privacy protection and fraud prevention.
-
The Cybersecurity Threat in New York City
Nov 1, 2017
New York City holds a trove of the kind of data cybercriminals love. Crain’s Custom recently spoke with Jerry Ravi, and Mike Nizich for their insight on the current cyberthreat facing New York City companies and how companies can protect themselves..
-
Cybersecurity Regulation Increases and Threat Intelligence Reduces Risk
Jul 25, 2017
Organizations in all industries struggle with the ability to identify all of the emerging cyber threats while addressing legal and regulatory consequences of cyber breaches.
-
2018 SEC Examination Priorities
Feb 15, 2018
On February 7, 2018, the Office of Compliance Inspections and Examinations of the Securities and Exchange Commission published its 2018 examination priorities on its regulated entities. OCIE identifies four pillars in its exam program.
-
Defending Your Organization Against the “WannaCry” Attack
May 15, 2017
Computer malware quickly spread to more than 150 countries. Companies are at risk because of a Windows Operating System vulnerability within SMB services running on Port 445. Having this Windows vulnerability unpatched can open the door to infection.
-
EU Imposes Strict Regulatory and Data Protection Compliance Measures
Mar 16, 2018
The European Union has imposed a strict data protection regulations on firms established in the EU and on all firms that control or process European personal data. All firms subject to the regulations must comply by May 25, 2018.
-
Nine Cyber Controls for a Geopolitically Disruptive Environment
Apr 12, 2022
Given current geopolitical conflict, here are nine cyber controls to consider for your organization to help minimize the risk of cyber disruption.
-
White House Urges ‘Immediate’ Action to Protect Against Cyber Attacks; A Guide for Business Leaders
Mar 23, 2022
Learn about the enhanced cybersecurity protections recommended by the White House including cybersecurity best practices.
-
Mar 24, 2022
Learn more about the new SEC proposal of new cybersecurity risk management rules to enhance cybersecurity preparedness
-
Cybersecurity Insurance Renewal: Keep Your Rates Low and Reduce Your Risk of Denied Coverage
Jan 12, 2022
Learn more about the most recent cybersecurity insurer updates and the assistance EisnerAmper can offer with the coverage renewal questionnaire
-
Unleashing the Power of SIEM: How to Strengthen Your Organization's Security Posture
May 11, 2023
Security information and event management (“SIEM”) combines security information management and security event management into a single solution, enabling organizations to collect and analyze security-related data from multiple sources in real time.
-
MOVEit Data Breach: Protecting Yourself and Your Business
Jun 29, 2023
A massive cyberattack recently exposed millions of individuals' personal data to hackers. MOVEit, a popular file-transfer system used by numerous organizations worldwide, was compromised by a ransomware group that exploited a vulnerability in the software. Learn about the risks and what to do if you are impacted by this data breach.
-
Why More Companies Are Turning to SOC 2 Cybersecurity Compliance Than Ever Before
Mar 17, 2023
Learn why SOC2 Cybersecurity Compliance is important and what the Risk-Cost-Benefit is.
-
Cybersecurity Insurance Renewal: Keep Your Rates Low and Reduce Your Risk of Denied Coverage
Mar 17, 2023
If your cybersecurity insurer asked you to complete a new or more rigorous questionnaire to renew or increase your cyber insurance policy, you need to take it seriously.
-
Three Ways the SAFER Guides Can Help Protect Against Cyber Attacks
Aug 29, 2023
Three ways the SAFER Guides—recommended practices for electronic health records—can help hospitals proactively mitigate and respond to cyberattacks and other downtime events.