How and Why to Protect Your PII

By | Corporate Compliance, Data Security, Enterprise Security, Information Technology | No Comments

What is PII? Personally identifiable information, or PII, is a common term in information security and privacy law denoting any information that can be used to identify an individual – alone or in context with other information. PII can be used by hackers and malicious parties to steal or exploit an individual’s identity, and with the high frequency of data…

Read More

NCUA Butts Heads with Credit Unions, Vendors

By | Corporate Compliance, Credit Unions, Data Security | No Comments

Debbie Matz, the Chair of the National Credit Union Administration, recently called for greater vendor regulation and oversight for credit unions in the U.S, out of a fear that vendor vulnerability could compromise credit union data. Her fear is founded, since vendor vulnerability has been the cause of multiple major data breaches, but credit unions have spoken up against greater…

Read More

Is Apple Pay Just What Credit Unions Are Looking for?

By | Corporate Compliance, Data Security, Enterprise Collaboration | No Comments

Apple Pay now has around 90 banks and credit unions signed up to support Apple Pay in some way, and credit unions make up nearly half of that list. Credit Union Magazine attributes the high percentage to “the credit union movement’s commitment to remaining relevant and increasing its growth momentum.” In other words, credit unions have a mission to serve…

Read More

A Global Look at Cybersecurity

By | Corporate Compliance, Data Security, Information Technology | No Comments

Last year, McAfee and the Center for Strategic and International Studies published a report on the cost of cybercrime, estimating the annual cost to the global economy to be over $400 billion. The U.S., China, Japan, and Germany account for $200 billion of that. With the State of the Union address and ensuing changes in cybersecurity regulations in the U.S.,…

Read More

How Did the State of the Union Address Cybersecurity?

By | Corporate Compliance, Data Security | No Comments

If you have any interest in cybersecurity, recent data breaches, or data protection, you were probably anxious to hear what President Obama would cover in his State of the Union address last week. I recently wrote a brief summary of the recent events leading up to the flurry of legislative talk about cybersecurity – from the Sony hack in November…

Read More

What’s Behind the Push for Cybersecurity Legislation?

By | Corporate Compliance, Data Security | No Comments

President Obama is adamantly pushing to standardize how data breaches are reported to consumers and stakeholders at the federal level, potentially ending decades of state-specific policy that varies wildly from state to state. Tuesday night’s State of the Union address solidified cybersecurity’s place in the list of current national priorities, but there was an astonishing lack of attention paid to…

Read More

Chick-fil-A: The First Data Breach of 2015

By | Credit Unions, Data Security | No Comments

If 2014 was “the year of the data breach,” then 2015 is already carrying the torch. Just two days into 2015, Chick-fil-A announced an investigation they’re conducting into a potential data breach with payment cards used at their locations. Chick-fil-A was forthcoming with consumers and interested parties in a press release posted to their website on January 2, which also…

Read More

Data Breach Battle Brews Between Banks and Retailers

By | Data Security, Enterprise Collaboration | No Comments

Data breaches took center stage in 2014 for major corporations and banks alike, fueled by major occurrences with an unprecedented amount of media attention. As companies and consumers pick up the pieces, the conversation is shifting to how data is stored and processed, and who is to blame when a breach takes place. Retailers fighting back Recent reports from Independent…

Read More

Sony & the Intangible Costs of a Data Breach

By | Data Security, Enterprise Collaboration | No Comments

The recent breach of Sony’s email servers has resulted in countless private conversations being exposed to the media, stakeholders, and those orbiting the secretive world of Hollywood. The breach stands in stark contrast to popular media stories on consumer credit cards and stands as a testament to the less tangible costs of a data breach. Emails are leaked and relationships…

Read More
Sound exciting? Try Arc for free now! Get Started