South Carolina Insurance Data Security Act

South Carolina Insurance Data Security Act South Carolina Code of Laws Unannotated  Title 38 – Insurance CHAPTER 99 Insurance Data Security Act SECTION 38-99-10. Definitions. Section effective January 1, 2019. As used in this chapter: (1) “Authorized individual” means an individual known to and screened by the licensee and determined to be necessary and appropriate to […]

test

Deliver Uncompromised

Mitre Releases Supply Chain Guidance for DoD “For mission owners, the primary goal of DoD must be to deliver warfighting capabilities to Operating Forces without their critical information and/or technology being wittingly or unwittingly lost, stolen, denied, degraded or inappropriately given away or sold.” William Stephens,Director of Counterintelligence, DSS Download Document Here Deliver Uncompromized is intended to serve as a MITRE Advisory […]

Cyber Quotes

Cyber Business Quotes “Every organization, regardless of size, must have a policy addressing the sharing of cyber related information.” Charlie Tupitza, CEO, National Forum for Public and Private Collaboration and President of RightExposure. “No private data should be copied to a Blockchain.” Anil John, program manager for the identity management project in the Cyber Security Division of […]

Keep Your Security Current

Keep Your Security Current Securing your software and networks isn’t a one-and-done deal. It’s an ongoing process that requires you to keep your guard up. If you use third-party software on your networks, or you include third-party software libraries in your applications, apply updates as they’re issued. If you develop your own software, how will […]

Secure Devices and Paper

Secure Devices and Paper Network security is a critical consideration, but many of the same lessons apply to paperwork and physical media like hard drives, laptops, flash drives, and disks. FTC cases offer some things to consider when evaluating physical security at your business. Securely store sensitive files. If it’s necessary to retain important paperwork, […]

Ransomware

Guidence How can I defend against ransomware? Update your software. Use anti-virus software and keep it up-to-date. And set your operating system, web browser, and security software to update automatically on your computer. On mobile devices, you may have to do it manually. If your software is out-of-date, it’s easier for criminals to sneak bad stuff […]

Phishing FTC

Phishing is when a scammer uses fraudulent emails or texts, or copycat websites to get you to share valuable personal information – such as account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money or your identity or both. Scammers also use phishing emails to get […]

Cybersecurity Infrastructure Security Agency Act

H.R.3359 One Hundred Fifteenth Congress of the United States of America An Act: To amend the Homeland Security Act of 2002 to authorize the Cybersecurity and Infrastructure Security Agency of the Department of Homeland Security, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America […]

Cybersecurity is Everyones Job

Click to download We are the greatest vulnerability in any organization. In this era of persistent cyber threats, an organization can be secure only with the active participation of everyone. Unfortunately, many organizations limit security responsibilities to designated security personnel that perform specialized security functions. Effective security must be enterprise-wide, involving everyone in fulfilling security responsibilities. Each member of the […]