PCI DSS Standard 4.0
The TRUE PCI Services team attended the annual 2019 PCI Community Meeting (PCICM) in beautiful Vancouver…
Read MoreHow To Protect Data During A Hurricane
Data Protection for Hurricanes and Natural Disasters Hurricane season is in full swing and, as always,…
Read MoreA Game of Thrones: Big Tech’s Legal Reckoning
When a hot new tech story broke on my Instagram feed yesterday morning (#MillennialLife), I immediately…
Read MoreCCPA Part III: Don't Fight the Tide
California Consumer Privacy Act: SEC.2 (h), an introductory statement giving context to the new privacy…
Read MoreProtecting Intellectual Property Part II: VOKSEE Leads the Way in IP Protection
As we explored in the first part of this series, Protecting Intellectual Property Part I, the Trusted…
Read MoreProtecting Intellectual Property Part I: Cyber Security Makes Its Way to Hollywood
“In the modern world, the most valuable asset that any entertainment organization can have is content.…
Read MoreQuick and Dirty Disaster Recovery Guide: Part III
I had the opportunity to work with one of our clients on a Disaster Recovery tabletop exercise last…
Read MoreWhat Is Phishing & How To Prevent It
Who hasn’t received an email from their boss telling them to get a certain task done quickly? Chances…
Read MoreThe Importance of Multi-Factor Authentication (MFA)
I am not exaggerating when I say that my life is my smartphone. I use it for everything - to email,…
Read MoreCalifornia Consumer Privacy Act (CCPA): What You Need to Know
In the first installment of our series on CCPA, Jenna Waters offered a breakdown of the coming law, and…
Read More