How to Send Breach Notifications

Send Breach Notifications

It has happened. Despite the annual security training. Despite the investment in cyber security. Cybercriminals breached your systems and stole your customers’ information. What do you do now? You’ll have to secure your network and determine which data may have been breached. But after you’ve shored up your systems, there’s still more work to do.…

Read More

Breach Notification Basics

Data breaches are becoming worryingly common. According to the Identify Theft Resource Center, there were 817 data breaches in the U.S. in the first half of 2022. Even if you have cyber security training for your employees and focus on securing your company’s network, breaches can happen. So, what do you do if you’ve had…

Read More

Part Three: How to Establish Quality Control

You’ve set up your Law Enforcement Response Program (using tips from Part 2 of our blog series). You’ve trained your law enforcement specialists. They have process documentation to follow. You’ve made it easy for Law Enforcement to know how to submit their requests. But how do you know if everyone is following through with the…

Read More

Part Two: A Standardized Law Enforcement Response Program

As we discussed in Part One, there are a lot of external pieces to consider when you receive a data request from Law Enforcement (LE). There are different laws, different types of requests, and different kinds of content. But you must also consider all the moving parts in your own company. A standardized process will…

Read More

Part One: Law Enforcement Requests Overview

gavel with law books

Does your company handle customer data? If so, there’s a chance you have received a Law Enforcement request for data, such as a subpoena, court order or warrant. And if not, there’s a chance you soon will. In today’s world, it’s nearly impossible to run a business without being online. Therefore, almost all companies have…

Read More

How to Use Strategic Program Management To Elevate Your Trust & Safety Program

Desk workstation

Program management is an important part of every type of program from anti-piracy to compliance to fraud. Today we’re going to focus on how strategic program management can help elevate your Trust & Safety program through communication, organization, and reporting. Whether you manage programs relating to digital crimes, digital safety, cybersecurity or fraud prevention, these…

Read More

Consent Phishing: An Increasing Threat

Consent Phishing

As the pandemic continues to keep many workers home from the office, companies are using cloud services and apps more than ever. This heightened use of virtual tools has led to an increase in certain types of phishing attacks. In particular, we are seeing a rise in consent phishing. What is it? Consent phishing is…

Read More

7 Tips for Keeping Connected While Working Remotely

conference call

It’s been months and many of us are still working at home because of the pandemic. We’ve found workarounds for being outside the office and adjusted to at-home workstations (even if it’s a laptop at the dining room table). We’re meeting deadlines and keeping up with our tasks, but some of us are feeling disconnected…

Read More