Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Tips for Safeguarding your Customers – PCI Compliance [Part 2]
You are here: Home \ Blog
Personal Information & Data Privacy
Posted on Monday, December 19th, 2016 by
Personal Information & Data Privacy in Canada: What is PIPEDA? Does PIPEDA apply to your organization?

Topics: Cyber Law, Privacy & Security

Protect Your Business and Customers with PCI DSS
Posted on Tuesday, December 6th, 2016 by
Protect Your Business and Customers with PCI DSS.

Topics: PCI DSS, Privacy & Security, Security Practices

“The Coming Storm of Litigation and Compliance”: Key Takeaways from Webinar
Posted on Tuesday, December 6th, 2016 by
Everything You Need to Know About "Reasonable Cybersecurity".

Topics: Cyber Law

12 Effective Security Habits
Posted on Monday, November 28th, 2016 by
Ensuring the protection of your clients and organization's assets is simple. You just need to follow these 12 effective security habits: 1. Focus on the Right Threats. Great companies realize that most security threats are noise that doesn’t matter. They understand that at any given time a few basic threats make up most of their risk, so they focus on those threats. Take the time to identify your company’s top threats, rank those threats, and concentrate the bulk of your efforts on the threats at the top of the list.

Topics: Privacy & Security, Risk management, Security Practices, Tips & Tricks

Data Breach Lawsuits
Posted on Monday, November 21st, 2016 by
Did you know that 83 class actions were filed in the United States in 2015 following a data breach? Organizations have to navigate through a complex web of legislation covering various approaches, such as system protection, data protection and proprietary information protection. In this context, the legal framework includes laws with extraterritorial application, privacy laws, information security laws, data breach notification laws, intelligence sharing laws and treaties in addition to contractual obligations.

Topics: Cyber Law

Above Security Interview
Posted on Friday, November 18th, 2016 by
Shopping online for Black Friday is convenient. You avoid the crowds, you can browse more effectively with the comfort of your home. However, we are not immune to security. How to protect yourself from identity theft or credit card fraud?

Topics: Security Practices, Tips & Tricks

Ransomware What About the Law
Posted on Tuesday, November 15th, 2016 by
What are the legal implications of ransomware? How should organizations prevent, respond and recover from digital extortion?

Topics: Cyber Law, Ransomware, Security Practices

protect-your-data-from-ransomware-attacks-above-security
Posted on Tuesday, November 15th, 2016 by
2016 has been a whirlwind year when it comes to ransomware attacks. Ransomware incidents have exploded and organizations, especially those holding critical information, find themselves helpless to combat the malicious code.

Topics: Ransomware, Security Practices

Building a Security Operations Center
Posted on Thursday, November 10th, 2016 by
We rely on connectivity for nearly all aspects of business which puts companies at risk to a multitude of hacks such as malware, phishing, ransomware, and denial-of-service attacks. It is more important than ever for organizations to escalate their level of protection against cyber-attacks. Fortifying your organization’s security posture has become one of the top priorities for businesses across all industries. Building a Security Operations Center or SOC in order to centralize defenses, coordinate and deploy people, processes and technology is a growing part of the strategy of information security leaders in even small and medium-sized businesses.

Topics: MSS, Security Operations Center, Security Practices

Risk Management - Why Perspective is Essential
Posted on Friday, October 28th, 2016 by
Everybody deals with risk management. Including you! Here is one of the lessons learnt from my personal life...

Topics: Tips & Tricks

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now