Privacy and Compliance
Videoconferencing Security Guide
With recent events, videoconferencing has become an even more important business tool, since in-person meetings have been discouraged. Unfortunately, this growth has also made it a target for a series of new attacks such as meeting bombing, malicious links in a chat, and stolen meeting links to name a few.
Password Policy Guide
Passwords are the easiest form of computer security to implement, and there have been many variations.
Identity Management for Financial Services & Banking
Compliance is the goal of nearly all privacy and internal controls in financial services. But compliance is just the start.
Getting to Security – with Compliance
Meeting compliance regulations doesn’t ensure that controls are effective against the latest cyber threats. Even compliant organizations are breached. And it doesn’t mean that there aren’t hidden vulnerabilities waiting to be exploited.
Uniquely you: Why biometric verification is key to proving digital identity
Biometric verification enables customers to prove ownership of their identity documents, and deters even the most sophisticated fraudsters. Read our report to learn why biometric verification is the future of identity verification.
Fraud and the future of digital onboarding
Identity theft is the fastest growing crime in the US. Globally, 1 in 60 online transactions are fraudulent. And if you don’t know who your customers are, you can’t onboard them to your platform.
Friendly fiction – the guide to optimizing onboarding
When it comes to user onboarding, there’s a tension between security and convenience. Try to shortcut security, and you'll pay the price. But add too much friction and you'll struggle to scale. So how can you optimize your user experience to introduce just the right amount of ‘friendly’ friction and unlock growth? Read the eBook to learn.
Are you using the best approach to catch digital identity fraud?
Get IDV right, and reap the rewards. A smarter, hybrid IDV solution can help you do much more. Read the ebook to learn more.
How to detect the 7 types of document and identity fraud
Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
A guide to digital identity verification: the technology & trends
Identity risk management: it's more important than ever. Traditional businesses are taking their operations fully digital, and newer all-digital businesses are growing. Both groups need to onboard new users to their services remotely. But they also need to monitor the risks to their platform as their user base increases. Download this guide to learn more.
Financial services, fraud, and the future of digital onboarding
Identity theft is the fastest growing crime in the US. Globally, 1 in 60 online transactions are fraudulent. And if you don’t know who your customers are, you can’t onboard them to your platform. Though businesses are moving online, their identity verification and KYC processes haven’t. Instead, the old processes are being shoehorned into the digital age. So how can you update your onboarding for the digital age? Read this whitepaper.
GDPR: Year one report
As we pass the one-year mark from the GDPR’s effective date, our latest guide, Checking in on the General Data Protection Regulation (GDPR), reviews where we are now. It considers how enforcement has played out so far — and what that means — and summarizes the profusion of recent data privacy laws in the U.S. And since most companies are still falling short of GDPR compliance, it wraps up with recommended compliance tips to assist those organizations that aren’t confident they’re meeting all of their data privacy requirements.
A how-to guide for managing discoverable data
This latest guide, “A How-To Guide for Managing Discoverable Data,” breaks down the five key components that information governance shares with ediscovery and explains why the quality of your ediscovery depends on the quality of your information governance. It covers data organization and management, record retention and its flip side, defensible deletion, data access and security, and the extraction and use of critical business data. After all, your litigation opponents shouldn’t be the only ones gaining value from your discoverable data.
Power users – highway to the heart of the enterprise
Protecting power users requires multiple layers of security and a zero-trust architecture. Discover what these seven experts recommend to secure power users and protect the crown jewels from even the most sophisticated attackers.
Seven tough questions every brand should ask before switching CAs
Taking the matter of choosing a certification authority (CA) into your own hands is a wise move and yet, it’s not as challenging as some would presume. Transitioning digital certificates over to a new CA involves uncertainty to key touch points: IT infrastructure and security, customer privacy, websites and eCommerce. These touch points are weighty enough to deserve a thoughtful review to consider whether or not your current CA can adequately provide brand security for your organization and the customers who transact on your website.
Legal holds: A how-to guide to preserving data for litigation
Don’t limit your ediscovery with sloppy or error-prone legal holds. Learn how you can preserve critical evidence, avoid spoliation sanctions, and save money by improving this foundational step. Download your copy of the guide here.
A how-to guide for establishing an ediscovery process
If you can’t honestly answer that your ediscovery process is in great shape, then we’ve got the guide for you. In Start Here: A How-to Guide to Establishing an Ediscovery Process, we’ve given stage-by-stage advice about how to achieve real, measurable improvements in your ediscovery. We cover every step from legal holds to post-matter resolution, complete with best practices and a helpful checklist for reference. In short, this practical guide can help you create and implement an effective, modern ediscovery process.
Farewell to audit season
Few companies look forward to an audit, but it’s an essential and thorough part of testing security controls. Performing an audit is a demanding, resource exhaustive, time-consuming process that would pause operations until the auditors were finished. The upside was most audits were seasonal and a one-and-done process. However, with the recent advances in technology and degree of consumer protections, what was once a seasonal event has turned into a near-daily routine.
Top 10 PCI DSS compliance pitfalls and how to avoid them
Despite the fact that PCI DSS has been in effect for over a decade, and most merchants are achieving compliance, some of the world’s largest retailers have still been hit by data breaches. The sad truth is that achieving compliance doesn’t guarantee data protection, even for large organizations. In this white paper, we’ll walk through the most common PCI DSS pitfalls, and what you can do to avoid them.
How to get G, R & C singing from the same hymn book
Balancing governance, risk and compliance is essential, especially for companies in highly regulated industries such as healthcare, finance and retail. When you throw in international data sharing, especially with the European GDPR rules, it can be overwhelming.