What is India’s Personal Data Protection Bill (PDPB)? Rights, Responsibilities & Everything You Need to Know
Titus
by Chris Brook
8M ago
India is the second-largest internet market in the world, with more than 760 million active internet users. While the Supreme Court of India recognized the right to privacy in a 2017 verdict, India has not yet passed a comprehensive data protection bill. The current iteration, India’s Digital Personal Data Protection Bill 2022, is expected to be tabled during the Monsoon Session of Parliament in July 2023. This article provides an overview of India’s Personal Data Protection Bill, the evolution of data privacy laws in India, and the rights, responsibilities, and obligations set forth in the pr ..read more
Visit website
What Is the Federal Risk and Authorization Management Program (FedRAMP)?
Titus
by Robbie Araiza
1y ago
An Introduction to FedRAMP In late 2011, the Office of Management and Budget under the Obama Administration released a memorandum that introduced the Federal Risk and Authorization Management Program (FedRAMP), noting that “[in the two years prior], the Administration worked in close collaboration with the National Institute of Standards and Technology (NIST), the General Services Administration (GSA), the Department of Defense (DOD), the Department of Homeland Security (DHS), the United States Chief Information Officers Council (CIO Council) and working bodies such as the Information Security ..read more
Visit website
Data Protection Myths and the Truths Behind Them
Titus
by HelpSystems Webmaster
1y ago
To implement or not to implement? That is the question when evaluating a new technology solution for your organization. Complicating the often daunting decision are the preconceived notions held at various organizational levels as to whether the solution is necessary, or more trouble than it’s worth. This can become especially problematic when misinformed thinking is the reason an organization doesn’t implement solutions that are vital to protecting one of the most valuable assets – data. Here, we’re addressing some of the common data protection myths, the truth behind them, and how data class ..read more
Visit website
“See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022
Titus
by HelpSystems Webmaster
1y ago
What comes to mind when you hear the term “cybersecurity”? Chances are, you think of devices, AI, automation, networks, etc. working to protect valuable information, data, and assets from cyber threats. You probably don’t picture users as a major part of cybersecurity. However, in order for organizations to have a solid cybersecurity program, they must empower users to become perhaps their greatest security asset. For Cybersecurity Awareness Month 2022, we have put together five tips to help users “see yourself in cyber” through technology and best practices. 1. Know your data, protect your da ..read more
Visit website
“See Yourself in Cyber” and Stay Ahead of Cybersecurity Threats – Cybersecurity Awareness Month 2022
Titus
by HelpSystems Webmaster
1y ago
What comes to mind when you hear the term “cybersecurity”? Chances are, you think of devices, AI, automation, networks, etc. working to protect valuable information, data, and assets from cyber threats. You probably don’t picture users as a major part of cybersecurity. However, in order for organizations to have a solid cybersecurity program, they must empower users to become perhaps their greatest security asset. For Cybersecurity Awareness Month 2022, we have put together five tips to help users “see yourself in cyber” through technology and best practices. 1. Know your data, protect your da ..read more
Visit website
Guarding Against Insider Threats
Titus
by HelpSystems Webmaster
1y ago
When you see or hear the term “data breach” in the media, is the first thought that there must have been a hacker involved? It may surprise you to know that hackers actually aren’t the main cause of data loss and data breaches within organizations. Most can actually be attributed to insider threats, mainly by employees just trying to do their job who make a negligent error, such as sending an email to the wrong person. So what makes insider threats dangerous? What are the types of insider threats, how do they happen, and how can data classification bolster your security ecosystem to help preve ..read more
Visit website
The Magical Implementation – Awareness, Safety Crews, and Plans for Potentially Dangerous Stunts
Titus
by Dana McMullan
1y ago
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale(Based on a Data Classification implementation but applicable to most large End User Impact implementations) Preface Dana McMullan is founder of Pasteboard Consulting, LLC specializing in End User Impact (EUI) Security Solutions with over 30 years of implementation and support experience.  He specializes in, and is credited for leading, multiple global security product implementations.  Dana is also a renowned magician who has toured with his own stage produc ..read more
Visit website
The CMMC Program
Titus
by HelpSystems Webmaster
1y ago
As the number of new data privacy regulations and programs coming into effect in the US continues to increase, one of the latest to emerge is the Cybersecurity Maturity Model Certification (CMMC) program. Unlike most of the current state-specific US data privacy regulations, the CMMC is a government regulation imposed by the Office of the Under Secretary of Defense. Under CMMC, any organization that is part of the Department of Defense’s (DoD) supply chain (or plans to be in the future), or is a contractor or subcontractor, will be required to abide by a certain set of cybersecurity requiremen ..read more
Visit website
The Magical Implementation – Picking the Right Assistant(s)
Titus
by Dana McMullan
1y ago
A magical and practical series of tips, tricks, and a real-world guide to implementing impactful end user technologies at scale(Based on a Data Classification implementation but applicable to most large End User Impact implementations) Preface Dana McMullan is founder of Pasteboard Consulting, LLC specializing in End User Impact (EUI) Security Solutions with over 30 years of implementation and support experience.  He specializes in, and is credited for leading, multiple global security product implementations.  Dana is also a renowned magician who has toured with his own stage produc ..read more
Visit website
Understanding and Protecting CUI
Titus
by HelpSystems Webmaster
1y ago
The ever-increasing ability to share information is a double-edged sword. On the one hand, it is much easier to communicate and work more efficiently, but it also means less control over shared information and more people looking at data. This trend, along with ad-hoc and agency specific markings, policies, and procedures, led to the need for the U.S. government to develop a standardized classification framework that would protect Controlled Unclassified Information (CUI) without impeding the authorized sharing of it. Let’s explore what CUI is, the standardized classification framework develop ..read more
Visit website

Follow Titus on FeedSpot

Continue with Google
Continue with Apple
OR