SEC Cybersecurity Guidance: Mobile Device Management

Protecting Your Business’ Most Sensitive Mobile Data Gone are the days of the rotary phone.  Data is immensely portable.  As we — individuals, consumers, corporate employees, investment advisors and financial investors — continue to rely on our mobile devices for everything, the level and amount of sensitive data that is stored on our mobile devices [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt. 2)

Welcome back to SEC Cybersecurity Guidance: Business Continuity Planning.  The first steps (found here in Part 1) are: List your Specific Needs, and Discuss and Document... and here, in Part 2, we talk, and plan, and test. Disclaimer: we are STILL not lawyers.  We are cybersecurity practitioners who work with a lot of registered [...]

SEC Cybersecurity Guidance: Business Continuity Planning (Pt.1)

If you’ve come to this site, you’re probably doing some research about SEC Cybersecurity Guidance. As part of the OCIE Cybersecurity Initiative, #6 in the SEC cybersecurity guidance clearly states that business continuity planning is a priority. Here’s what the SEC Cybersecurity Guidance says: “Please provide a copy of the Firm’s written business continuity [...]

13 Fantastic Resources for Writing an Information Security Policy

So, you need to write an information security policy. And you’re totally overwhelmed. Where do you start? What do you need? What should it entail? You’re not alone. These are questions that we get a lot. It’s totally understandable. Planning, writing, and implementing a security policy can be seriously intimidating. If it’s poorly written or [...]

By |2019-01-04T20:09:25+00:00November 10th, 2018|Computer Cyber Security, HIPAA|0 Comments