Incident response is difficult for many small businesses. Here's a practical approach to defining a working playbook when there is no specialist team to take care of cyber attacks for you.
SIPOC cyber is a structured process for mapping information assets to business processes. Get a free template and get started today!
Information security is a diverse field requiring a diverse workforce. See how your current strengths map to core activities in a good security management program!
Managing requests from persons whose data you process is a key aspect of GDPR compliance. Learn more about how to optimize managing and responding to user requests in this practical workflow post.
Do you value privacy? Most individuals and companies would reply with a clear "Yes!" to that simple question but their actions are often not very well aligned with that expressed attitude. What are the legal privacy rights we have as individuals? Before we consider whether ee actually do value privacy, let's review what rights the … Continue reading Privacy isn’t about secrecy, it is about human rights