Expert Insights

blog

GDPR’s Personal Data Definition & Privacy Notice Guidelines

One of the defining transparency requirements under the General Data Protection Regulation is for organizations to allow individuals the right to be informed about the collection and use of their personal data. When personal data is collected, organizations must immediately provide individuals with a privacy notice including: how the data will be used, how long it will be held, and who it will be shared with.
 

Ted Wentzel by Ted Wentzel

Microsoft’s “Compliance Manager” helps users meet GDPR requirements

Organizations moving data from on-premises locations to a Microsoft Cloud service such as Office 365, Azure, or Dynamics 365 now have access to Microsoft’s “Compliance Manager”. This tool was created with security, compliance and privacy in mind, and it’s designed to assist organizations in managing their compliance activity. With GDPR going into effect on May 25, Microsoft’s Compliance Manager is available with just enough time left to get ready.
 

Ted Wentzel by Ted Wentzel

Embrace GDPR to Increase Trust and Transparency

There are fewer than 100 business days left until GDPR is effective. On May 25, 2018, all organizations with European clients must be GDPR compliant to avoid potentially large fines. However, the risk is not just the fine—your company’s reputation is at stake.

Ted Wentzel by Ted Wentzel

Windows Defender vs. Windows Defender ATP

Beyond turning on a firewall, the next basic steps to protecting a system are to activate anti-virus and anti-malware software. Windows now provides these functions built-in, in the form of the Windows Defender tool. (Users have the option of turning off Windows Defender and instead using third-party tools.) Windows Defender provides classic, signature-based analysis on a real-time basis. That is, if a user tries to launch a file recognized as bad, Defender intervenes. Note that while IT administrators might also benefit from a management tool to harvest reporting data from Defender, the tool itself operates effectively without any other software installed.
 

Ted Wentzel by Ted Wentzel

Survey Data Indicates Big Gap in GDPR Readiness

GDPR is at the forefront of our conversations with clients, as more and more IT leaders in the U.S. are increasingly recognizing how GDPR rules will affect them.
 

Ted Wentzel by Ted Wentzel

3 Steps U.S. Companies can Take to Prepare for GDPR

If it feels like the General Data Protection Regulation is right around the corner, that’s because it is! The new European privacy law will go into effect May 25, 2018, which leaves companies with just over six months to prepare.

Ted Wentzel by Ted Wentzel

How will GDPR work to protect data subjects?

With less than eight months until the General Data Protection Regulation takes effect, we’re gearing our readers up for the changes with a series of blog posts exploring details of the new law. So far we’ve covered what GDPR is and why it’s important, consequences if you’re not compliant, and the top three changes to expect under the new law. This time, we’re going to delve into rights of the data subjects and how they’ll be protected under GDPR.

Ted Wentzel by Ted Wentzel

Approaching Security Projects After Prior Efforts Failed

Sometimes in our work with clients we assist with security projects that occur subsequent to one or more failures in prior efforts to achieve security improvements. In these situations, we are usually able to quickly identify the reasons why past efforts failed and plan a new project that we know—based on many experiences elsewhere—will succeed. Sometimes the new project uses the same technology as the failed project. Sometimes we suggest an entirely different approach.
 

Chris Blackburn by Chris Blackburn

Return on Security Investment - use this ratio!

With more recent publicity regarding hacking of personal data it is surprising how many businesses need to secure their systems.  In our world, regardless of what vertical business we are in – manufacturing, retail, financial services, healthcare, education, or government – securing data and infrastructure should be of the utmost importance to a CFO today.  It can take up to 200 days to even realize there was a breach!
 

Tracie Parent by Tracie Parent