Even the best security can be circumvented by an insider or a cutting-edge cyberattack but an organization doesn’t have to weather the cost alone. Cyber insurance can help cover a variety of breach expenses, and some policies even provide pre-breach services and tools designed to bring an organization’s security to the next level.
Effective privacy and information security programs start with attention to governance. These eight guidelines will help establish and measure privacy and information security structure and processes.
This due digilence checklist will help track and evaluate document requests, warn of privacy and security issues, and provide a basis for determining action plans and resources required to integrate privacy and security programs.
This month's security Q&A answers readers' questions about accounting of disclosures, providing information to marketing departments, unencrypted emails, and terminating BAAs.