As 5G connectivity becomes more widely deployed, organizations across all industries are leaning into AI tools that promise speed, automation, and deeper insights. But the combined power of 5G + AI creates an urgent...more
7/31/2025
/ 5G Network ,
Artificial Intelligence ,
Data Collection ,
Data Mapping ,
Data Privacy ,
Data Retention ,
Data Security ,
Employee Monitoring ,
Information Governance ,
Personal Data ,
Privacy-By-Design ,
Risk Management ,
State Privacy Laws
As cybersecurity threats escalate, state legislatures across the country are tightening requirements for how insurance entities respond to data breaches – and thanks to a new law just passed several weeks ago, Missouri is...more
7/18/2025
/ Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Insurance ,
Incident Response Plans ,
Information Security ,
Insurance Industry ,
National Association of Insurance Commissioners ,
New Legislation ,
Non-Public Information ,
Notification Requirements ,
Personally Identifiable Information ,
Regulatory Authority ,
Reporting Requirements ,
Security Risk Assessments ,
State Data Breach Notification Statutes ,
Third-Party Risk ,
Third-Party Service Provider
The SEC’s amended Regulation S-P, adopted last year, will soon enhance data privacy protections for broker-dealers, investment companies, registered investment advisors, and transfer agents. The updated rule requires these...more
6/30/2025
/ Amended Regulation ,
Broker-Dealer ,
Consumer Information ,
Corporate Counsel ,
Customer Information ,
Cybersecurity ,
Data Breach ,
Data Disposal Protocols ,
Data Privacy ,
Data Protection ,
Data Retention ,
Data Security ,
Deadlines ,
Due Diligence ,
Financial Institutions ,
Incident Response Plans ,
Investment Companies ,
Notice Requirements ,
Policies and Procedures ,
Popular ,
Registered Investment Advisors ,
Regulation S-P ,
Securities and Exchange Commission (SEC) ,
Transfer Agents
Businesses should be aware of growing security risks from North Korean IT workers targeting freelance contracts from businesses in the U.S. and other countries. Typically, these workers fraudulently claim they are from the US...more
5/15/2025
/ Cyber Crimes ,
Cyber Threats ,
Cybersecurity ,
Data Security ,
Economic Sanctions ,
Foreign Workers ,
Fraud ,
Freelance Workers ,
Hiring & Firing ,
Independent Contractors ,
Information Technology ,
North Korea ,
Popular ,
Risk Mitigation ,
Scams
The country’s largest provider of cloud-based education software for K-12 schools announced on January 7 that it fell victim to a massive data breach – which may lead to questions about the implications for your school....more
1/13/2025
/ Cyber Attacks ,
Cyber Incident Reporting ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Hackers ,
Incident Response Plans ,
Notification Requirements ,
Personally Identifiable Information ,
Popular ,
Ransomware ,
School Districts ,
Student Records ,
Teachers
With the HIPAA Security Rule set to undergo a massive overhaul to boost cybersecurity protections, PEOs need to take note. After all, as stewards of worksite employee and client company data – and as sponsors of group health...more
1/8/2025
/ Comment Period ,
Covered Entities ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Electronic Protected Health Information (ePHI) ,
Employer Group Health Plans ,
HIPAA Security Rule ,
Professional Employer Organization ,
Proposed Rules ,
Public Comment ,
Risk Assessment
The HIPAA Security Rule may soon undergo a big overhaul that would better defend healthcare data from cybersecurity threats – and require much more from covered entities when it comes to establishing and maintaining defenses....more
1/7/2025
/ Business Associates ,
Comment Period ,
Covered Entities ,
Cyber Attacks ,
Cyber Threats ,
Cybersecurity ,
Data Breach ,
Data Privacy ,
Data Protection ,
Data Security ,
Department of Health and Human Services (HHS) ,
Electronic Protected Health Information (ePHI) ,
Health Care Providers ,
HIPAA Security Rule ,
Incident Response Plans ,
Proposed Rules ,
Public Comment ,
Risk Management