Sort
View
Cyberthreat Landscape for PEOs
Best practices for responding to new AI-enhanced cyber threats.
We Get Privacy for Work — Episode 10: Employee Monitoring Tools: Too Good to Be True?
Lured by the promise of better productivity and compliance with company policies, employee monitoring tools are gaining a lot of traction among employers.
We Get Privacy for Work — Episode 9: The Explosion in BIPA Litigation
From timekeeping technologies to dash cams, the Illinois Biometric Information Privacy Act (BIPA) is now being used to challenge a number and variety of time-saving programs and tools.
We Get Privacy for Work — Episode 8: The Surge in Data Breach Lawsuits: Trends and Tactics
Class action lawsuits in response to data breaches have skyrocketed as plaintiffs look to take advantage of courts’ perceived leniency regarding standing.
We Get Privacy for Work — Episode 7: What Is a WISP and Why Your Organization Must Have One
Written Information Security Programs, commonly referred to as WISPs, are critical plans to have in place – not only to efficiently and effectively respond to ransomware attacks and data breaches when they occur – but to maintain compliant privacy practices for your organization.
We Get Privacy for Work — Episode 6: The Potential Privacy Risks Inherent to Mergers and Acquisitions
To say mergers and acquisitions present significant risk is an understatement; however, additional vulnerabilities are being exposed as bad actors threaten to exploit privacy and data security leaks during the transition.
We Get Privacy for Work — Episode 5: The Privacy Pitfalls of a Remote Workforce
Remote work has given employers and employees pathbreaking flexibility, but it has also raised a host of data and employee privacy concerns.
We Get Privacy for Work — Episode 4: Assessing the Risks of AI Tools
The widespread adoption of AI tools has the potential to increase efficiency in the workplace but can also create potential pitfalls if proper planning and processes are not in place.
We Get Privacy for Work — Episode 3: The Increasing Importance of Data Mapping
Knowing what data your organization is collecting and from whom is critical to effectively respond to cybersecurity data breaches and prepare for future incidents.
We Get Privacy for Work — Episode 2: Defining Reasonable Safeguards
Many federal and state laws require companies to have reasonable cybersecurity safeguards in the event of a data breach, but do not specify what protections are actually required.