2020 digital trust, cybersecurity and information resilience blog
Getting Ahead of Third Party Risk
All businesses have essential relationships with suppliers and clients. For many, it is practically impossible to do business without the assistance of such third parties. Read the blog article ‘Getting Ahead of Third Party Risk’ and discover how companies can identify, assess, manage, and treat supplier risk.
Consumers are becoming more data-conscious and are aware of how organizations manage their data. This awareness is leading to an increased number of Data Subject Requests (DSRs) being received from individuals. Read the blog article ‘How to respond to Data Subject Requests?’ and discover how you can manage these data requests within your organization.
Multifactor Authentication (MFA) - Committing to modernization
What is blocking organizations from embracing MFA? Michael Green, Senior Cloud Security Consultant discusses why One of the single most pragmatic actions that an organization can take for a quick security win with a very high ROI is to implement Multifactor Authentication (MFA).