Entries by Mike Bridges

Can E-mail Constitute A Legal Agreement?

By Mike Bridges

The Two Faces Of Imaging

By Mike Bridges

The CFPB’s Next Target

By Mike Bridges

The CFPB’s Next Target

By Mike Bridges

APATHY Enables Cyber Crimes

By Mike Bridges

Do You Have A Cyber Security Plan?

By Mike Bridges

Cyber Attacks: Protecting Your Business

By Mike Bridges

Cyber Security Begins With A Plan (Part Five)

*Cyber Security Begins with A Plan (Part Five)*
**By Mike Bridges**

***As we continue to talk about cyber security plans, we have to talk about The Red Flag Rule, which requires many businesses to develop and implement a formal, written Identity Theft Prevention Program for the purposes of detecting the warning signs, or “red flags”, of identity theft throughout their day-to-day operations. Here’s what else you need to know:

Cyber Security Begins With A Plan (Part Four)

*Cyber Security Begins With A Plan (Part Four)*
**By Mike Bridges**

***As we continue to talk about creating a cyber security plan, we have to touch on infrastructure and systems management.The potential privacy impact is assessed when new processes involving personal information are implemented, and when changes are made to such processes (including any such activities outsourced to third parties or contractors), and personal information continues to be protected in accordance with the privacy policies. For this purpose, processes involving personal information include the design, acquisition, development, implementation, configuration, modification and management of the following:

Cyber Security Begins with A Plan (Part Three)

*Cyber Security Begins with A Plan (Part Three)*
**By Mike Bridges**

***Do you have a plan to combat cyber threats? If you don’t, you need one. And any good plan should include assigning responsibility and accountability for system security. What should this cyber security expert do? Here’s some tips: