Data Breach Notification Laws: The Need for Spyware Detection Capability

Security measures that repel spyware attacks are critical to any comprehensive security plan, thanks to laws requiring companies to notify their customers if they experience a data security breach. But it’s not enough to have a plan for complying with breach notification laws. Every company’s goal should be to avoid having to give such a notification in the first place.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow

Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.  
  • Written By:
  • Published On:

Addressing the “Big Data” Issue: What You Need to Know

There is no doubt that big data, i.e., organization-wide data that’s being managed in a centralized repository, can yield valuable discoveries that will result in improved products and performance—if properly analyzed. Nonetheless, you must look before you leap. This white paper shows you what you need to know about big data, including the challenges big data presents, must-have practices to successfully manage a company’s big data, as well as the metrics to measure the ROI.
  • Written By:
  • Published On:

Stepping Up to the Challenge: CMO Insights from the Global C-suite Study

This IBM Institute for Business Value report, based on the responses from a survey of 524 CMOs, focuses on how CMOs are helping their enterprises become more “customer-activated.” Very few CMOs have made much progress in building a robust digital marketing capability. CMOs told us there are three prerequisites to being able to do this: using data analytics to get a much deeper understanding of customers, individually as well as collectively; designing rewarding customer experiences; and capitalizing on new technologies to provide those experiences smartly and efficiently.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Best of breed versus Suite Anti-spyware

The anti-spyware industry is going in two separate directions. First, there are suite products that come with other security applications, along with anti-spyware. Second, there are best-of-breed products that are purely focused on detecting and eradicating spyware. Depending on the type of organization, choosing a suite-based anti-spyware over best-of-breed software can leave a company vulnerable.
  • Written By:
  • Published On:

The Emerging Threat of Legal Liability for Failure to Prevent Spyware Attacks

Corporations striving to comply with data security laws and regulatory initiatives must implement anti-spyware measures. Businesses who fail to take reasonable physical, administrative, and technical measures to prevent the unauthorized acquisition, alteration, or destruction of valuable information, risk costly and disruptive legal proceedings. And courts and responsible agencies will freely second-guess such decisions in the event of a data breach.
  • Written By:
  • Published On:

Building a Business Case for Enterprise Spyware Protection

It is sometimes difficult to quantify the scope of spyware problems within corporate environments. The least noticeable effect of spyware is to slow network and desktop processing by tiny increments. But even the slightest slowdown, multiplied across the enterprise, adds up to a serious bottom line impact in decreased automated processing and worker productivity.
  • Written By:
  • Published On: