
PCI DSS Standard 4.0
The TRUE PCI Services team attended the annual 2019 PCI Community Meeting (PCICM) in beautiful Vancouver…
Read More
How To Protect Data During A Hurricane
Data Protection for Hurricanes and Natural Disasters Hurricane season is in full swing and, as always,…
Read More
A Game of Thrones: Big Tech’s Legal Reckoning
When a hot new tech story broke on my Instagram feed yesterday morning (#MillennialLife), I immediately…
Read More
CCPA Part III: Don't Fight the Tide
California Consumer Privacy Act: SEC.2 (h), an introductory statement giving context to the new privacy…
Read More
Protecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection
As we explored in the first part of this series, Protecting Intellectual Property Part I, the Trusted…
Read More
Protecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood
“In the modern world, the most valuable asset that any entertainment organization can have is content.…
Read More
Quick and Dirty Disaster Recovery Guide: Part III
I had the opportunity to work with one of our clients on a Disaster Recovery tabletop exercise last…
Read More
What Is Phishing & How To Prevent It
Who hasn’t received an email from their boss telling them to get a certain task done quickly? Chances…
Read More
The Importance of Multi-Factor Authentication (MFA)
I am not exaggerating when I say that my life is my smartphone. I use it for everything - to email,…
Read More
California Consumer Privacy Act (CCPA): What You Need to Know
In the first installment of our series on CCPA, Jenna Waters offered a breakdown of the coming law, and…
Read More