Comprehensive software reviews to make better IT decisions
To Combat the Reactive Culture Surrounding New Data Privacy Laws, MediaPRO Releases Training on the CCPA
MediaPRO has taken the lead in the market on offering training around the impending California Consumer Privacy Act (CCPA), a data privacy law set to go into effect on January 1, 2020.
The CCPA provides better protection for the personal data of Californian residents. The law will allow these residents to request organizations to reveal all information that has been collected on them, exactly how that data is being used today, and how it was used in the past, including if it was sold and to whom.
The resident can then demand that the organization stop selling their data. Organizations will not be able to penalize these residents for making this request. In the event of a data breach, residents will have the ability to sue the impacted organization for damages if their personal data was affected by the breach.
According to MediaPRO, an organization must comply with the CCPA if they collect, use, or sell Californians’ data and:
- The organization makes $50 million or more in annual revenue, and/or
- The organization sells more than 100,000 customers’ personal information each year, and/or
- The organization receives 50% or more of their annual revenue from selling this personal information.
MediaPRO’s training focuses on helping employees and key business stakeholders understand what types of data constitute personal information, how personal information should be securely handled within the organization, and the consequences that exist under the CCPA for organizations that mishandle the personal information that they store. It should be noted that, unlike GDPR, the CCPA does not require organizations to train employees about the regulation.
Source: MediaPRO at Software Reviews
According to BusinessWire, MediaPRO wants this training to go beyond CCPA and help employees protect their personal information beyond the business. The training is offered as part of MediaPRO’s Privacy Awareness TrainingPack product.
The CCPA is yet another privacy regulation to follow in the wake of the GDPR, and it will be far from the last. As the amount of data being collected on people around the world continues to increase, data privacy becomes increasingly important. However, releasing these laws is only the first step in changing the global culture of data privacy. The second step is for businesses to educate their employees about data privacy issues:
- Why are these regulations being put in place?
- How will the regulation impact them, both at work and at home?
- Why should employees take advantage of the new freedoms CCPA creates?
Like many areas of security awareness and training, the trend is to focus training on how security and privacy impact people on a personal level. Why should they care? How is this going to change their day-to-day lives? How will this regulation help them protect themselves and their families? Focus training on providing answers to these questions – an approach MediaPRO, and many of the leaders in this market, have adopted.
Want to Know More?
Humanize the Security Awareness and Training Program
ISACA and InfoSec Institute Produce Whitepaper on Using Marketing Techniques and Metrics for Improved Security Awareness Programs
Leverage Security Awareness and Training in Higher Education
Build a Privacy Program
Qualys VMDR and Ivanti have announced a new partnership dedicated to improving the detection and patching of vulnerabilities. Announced July 30, the Qualys and Ivanti Partnership have already gone live as an integrated component of the VMDR solution.
RiskSense announced on July 13 its new version of the cloud-delivered RiskSense risk management platform. The main draw of the program is its holistic risk calculation across CVEs and CWEs.
Cyberthreats are omnipresent for any enterprise. Monitoring ingress and egress points while still conducting business is a balance security professionals attempt to strike. Couple this with the continued security issues around remote work during the pandemic, and security teams have their hands full.
On May 26, Kenna Security released its new Prioritization to Prediction Benchmark Survey. This free tool provides organizations with the ability to compare their vulnerability management programs to industry averages Kenna Security has compiled over the years.
COVID-19 has changed a great deal about how businesses operate. From a security perspective, however, COVID-19 caught many businesses off guard. The shift from working in the office to working from home has made it difficult for security measures to keep pace. Specifically, how are businesses meant to maintain the same secure networks when their employees are no longer working in the office? Outside of the security of the IT departments, IT and security have a tough time ensuring that patching and vulnerability management remain at the forefront of a business’s priorities.
Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.
We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.
Four zero-day vulnerabilities were discovered in IBM’s Data Risk Manager. While the vulnerabilities are concerning, more so is IBM’s response when addressed. The company simply stated, “It’s out of scope.” – meaning it had no intention to rectify or address the issue.
Will New IoT Security Frameworks Push Compliance Obligations to the Forefront of Security Discussions?
The Internet of Things is increasingly embedded with our daily lives. While these devices make life more accessible, for every new device, a new attack vector for cyberattackers is created.