<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Datashield's Resource Library

Read all of our news, articles, reviews, and more in our company blog

All Posts

How to Celebrate Choose Privacy Week

Choose Privacy Week

Choose Privacy Week, first observed by the American Library Association Office for Intellectual Freedom (OIF) in 2010, is an initiative that invites the public to have a conversation about privacy rights in a digital age. The campaign gives the public the tools they need to educate and engage , and gives them resources to think critically and make more informed choices about their privacy.

Originally celebrated by public libraries, this week of celebration can be appreciated by all-- especially those in the Information Security industry.

Now is a great time to reflect on your organization's current security protocols around data privacy and consumer data:

 

Review your organization's Privacy Policy

Now is a great time to review your company's privacy policy for its employees and consumers. Often times privacy policies are implemented at a business' launch and left to age poorly over the years. Take time to review your company's most recent privacy policy available to the public and gather with security and legal teams to ensure your business is staying compliant and up-to-date with best practices.

 

Make sure your company website is GDPR-compliant

The General Data Protection Regulation (GDPR) is legislation passed in the EU that affects companies that operate in the EU or have site visitors from these areas. Compliance is key for enterprises looking to avoid hefty fines and respect how consumer data is stored and used.

 

Take time to review your vendors' privacy protocols

Protecting personal privacy is important, but so is securing your organization's. In cybersecurity, businesses tend to think about potential threats and breaches by outside attackers. But many cyberthreats come from internal sources unchecked by UEBA software or strict user privilege settings through vendor relationships and data vulnerabilities.

Make sure you take time to vet your vendors' privacy policies and data usage. If the service stores company data for your organization (especially in the cloud), make sure you investigate how secure their operations are as well. Third-party attacks can leave your business vulnerable.

 

Public resources

The ALA offers public consumer privacy protection resources such as:

  • A guide on how to protect your privacy while using public computers and Wi-Fi
  • Resource list on tools to protect user privacy like information on the Eight-Day Data Detox Kit and other free online tools to manage internet browsing privacy

Are you looking to improve your organization's security posture and meet consumer data compliance regulations?

Contact us today for a no-cost consultation on how Datashield can help.

Topics from this Article

Compliance, Cyber Security, User Privileges, CCPA, GDPR

Cassidy Trowbridge
Cassidy Trowbridge
Cassidy is a marketing specialist at Datashield. She manages Datashield's content and social marketing strategies.

Related Posts

Top 5 Most Popular Cybersecurity Certifications

The cybersecurity analyst has become the third most valuable job description in the technology industry. The increasing security incidents to IT infrastructure, the demand for accountability from end-users, and the financial cost of successful breaches are significant reasons enterprises and startups are taking cybersecurity seriously. Ambitious professionals who choose a career in IT security are reaping the benefits of securing operating systems and deployed IT infrastructure.

What is Ransomware?

Ransomware is a form of malware cybercriminals use to encrypt data stored in computers or online servers. Cybercriminals demand payment to release the encryption key blocking the user from accessing the encrypted data. Payment is typically made through diverse mediums, including digital currency like Bitcoin. Once payment has been made, the victim is generally provided with instructions on decrypting their data.

Datashield Announces Partnership with Bishop Fox

Two cybersecurity powerhouses partner to provide defensive and offensive security services to boost enterprise companies’ security posture. Scottsdale, Ariz.— Datashield, a Scottsdale-based cybersecurity company, recently inked its partnership with offensive security services firm Bishop Fox. Both companies are based in Arizona and provide outsourced cybersecurity services to top Fortune 500 companies.