Cyberlibility Insurance: Are You Covered?

Jennifer Noto Compliance, Security Leave a Comment

John Coupland, Executive Vice President at HUB International, was a major contributor to this blog post. With the increasing number of data breaches, ransomware, and cyber-attacks, many organizations have adopted cyberliability insurance to protect them in the event of an incident. The marketplace for cyber liability insurance policies is now very competitive, with offerings by many insurance companies. However, beware …

Risk Management, Disasters are Looming

Jennifer Noto Compliance Leave a Comment

By Dana Morrison, Auditor, Carolinas IT Before purchasing our house, I acquired a home inspector to go through our would-be home. He checked our roof, attic, heating and air, crawl space, deck, moisture levels, and probably hundreds of other things. Our home inspection report detailed many items that needed to be resolved, but fortunately, few were significant. One primary concern …

GDPR Checklist – What You Need to Know to Get Compliant

Jennifer Noto Compliance Leave a Comment

You’ve probably heard a lot of talk surrounding the General Data Protection Regulation (GDPR). GDPR applies to any company that does business with Europe, whether they are based in the EU or not. The new regulation will give users ultimate control over their data in where it resides, the ability to export, withdraw consent, and request access to it. The …

Sticking it to the Stick – The Danger of USB Drives

Jennifer Noto Compliance Leave a Comment

Years ago, USB drives were the best thing since sliced bread. The USB drive offered the convenience of extra storage that also served as a means of quickly moving files from one computer to another. It was a game-changer in terms of storage and saving files. No more saving to floppy disks and burning to CDs; just stick in your …

Carolinas IT Welcomes Two New Employees to Audit and Compliance

Jennifer Noto Compliance, News Leave a Comment

The Audit and Compliance team at Carolinas IT welcomes two new employees who will focus on security and compliance solutions for clients. Alexi “Lexi” Pappas joins the Audit and Compliance team at Carolinas IT, where she will be assisting in providing services to new and existing clients to ensure they are current in their control environment and compliant with applicable …

4 Myths About Business Associate Agreements

Jennifer Noto Compliance Leave a Comment

Having a Business Associate Agreement (BAA) in place with any third party you do business with is essential to protect yourself from any legal issues that may arise, but it’s not a failsafe initiative. There’s a lot of misinformation about how much protection a BAA actually provides. Here are 4 myths about Business Associate Agreements decoded. Myth: We don’t need …

The Top 3 Compliance Myths

Jennifer Noto Compliance Leave a Comment

There are a lot of misconceptions about compliance. It’s easy to think you’re compliant by checking off a few items on a list, but the truth is that an effective compliance program requires time and effort. Here are the top three myths about compliance. Myth: My business is compliant, therefore, it’s secure. Compliance does not equal security. It’s more than …

5 Tactics to Implement After a Data Breach Occurs

Jennifer Noto Compliance Leave a Comment

According to the 2016 Ponemon Data Breach Study, the average cost of a data breach is $4 million. Once a breach occurs, there are several things you must do to begin your recovery process. Here are 5 tactics to implement after a data breach occurs. Confirm the breach is over and secure your remaining systems. Once the breach is finalized, …

Acceptable Use Policies: What’s Important

Jennifer Noto Compliance, Security Leave a Comment

According to the Symantec ISTR, 53% of data breach incidents were caused by employees in 2015. These incidents occurred as a result of accidentally making private information public, theft or loss of device with corporate information, and insider threat. Acceptable use policies help companies regulate behaviors and activities among their employees to protect a company’s network and data. Additionally, these …

Top Ten Technology Priorities for Local Government – Disaster Recovery and Business Continuity

Jennifer Noto Business Continuity, Compliance Leave a Comment

The Public Technology Institute recently released a list of top ten technology management and application priorities for local government in 2016. PTI asked local government technology executives to rank a list of priorities from one to ten. Carolinas IT has a solution for each of these technology priorities and we will explore how we can help you with each of …