The search found 4253 results.
As the deadline for compliance with the EU’s General Data Protection Regulation (GDPR) approaches, it is critical to remember you are liable for the compliance of your vendor partners as well.
Imagine in the future a critical, personal medical device taken offline by ransomware. Is the Healthcare industry prepared for this cybersecurity risk?
Considering the risks of HIPAA non-compliance, health care companies generally benefit from hiring third party vendors that specifically handle HIPAA regulatory compliance. To fully protect patients, these vendors should have clear policies that restrict access, remain transparent and auditable, and maintain the most updated data security measures.
The threat is real. With all the security risks facing retailers today, we look at an approach to secure your remote support and deliver rapid, safe vendor access, track every system session, and gain proof of PCI compliance.
As the need grows for supporting geographically spread vendors, how can you make sure you’re validating identities and encrypting all data to keep your network secure?
There’s a trend of hackers being able to remain on an organization’s network for periods of time – without even being detected. Does this make you think about what measures you currently have in place to provide visibility of who is on your network, and what they are doing?
Outsourcing offers key advantages in costs and subject matter expertise. Yet, the safety of your business data depends on IoT risk management and the security protocols of vendor partners.
Due to the rise in cyber threats, educational institutions are facing increasing pressure to protect their sensitive data. In addition, they have to comply with FERPA or risk facing penalties. Read this blog to learn steps your organization can take to prevent a security attack.
Pearson Vue, a third-party certification manager, discovered malware on their Credential Manager System. Major clients, like Cisco, Oracle, and IBM react.
Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner.