Prevention matters, and knowledge is the key to prevention. By understanding exactly what identity theft is, how it happens, and how it affects you, you will be better able to prevent and, if necessary, resolve identity theft.
As threats continue to mount, understanding and managing cybersecurity risks has become top of mind for leaders in business and government. According to the Federal Trade Commission, business executives often ask how to manage confidential information.
While cyber liability losses and privacy claims continue to rise, a new exposure has arisen. Hackers have determined that due to the increased sophistication in computer security, it may be easier to manipulate an individual rather than a machine.
As the realities of digital change, evolve, and grow, the CIO position has become more critical. The CIO as “IT operator” is a construct of the past. The role has evolved to include business strategy co-creator, change instigator, and innovator.
Jerry Gagne, CPA, CISA, Principal – Wolf & Company, P.C.
Wednesday, March 6, 2019
Almost every day there are stories in the news about another security breach, another fraud warning, or another regulatory fine for lack of security. Join us as we highlighted the top 10 IT security gaps and what you can do about them.
The California Consumer Privacy Act (CCPA)—which comes into force on January 1, 2020—is one of the most significant regulations overseeing the data-collection practices of companies in the United States. Other states are expected to follow California’s lead.