The Six Essential Steps for GDPR Compliance in Higher Ed

The amount of coverage and attention the General Data Protection Regulation (GDPR) received leading up to May 2018 was intense to say the least. But even now, more than a year since that date has come and gone,organizations across the world are still either unsure or mistaken about whether they are compliant—and how to become so.

Read More

Identity Automation Extends Commitment to Protect Student Data Privacy with FERPA, COPPA, and California Student Data Privacy Certifications

As learning environments steadily move toward digital curriculum, protecting student data privacy becomes more and more critical.

Read More

The Unavoidable and Expanding Impact of GDPR Compliance on Higher Education

Each year, the United States hosts over a million foreign students. And for the schools they attend, this often means complying with rules and regulations that these students bring with them from their home countries. 

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 1

Today, institutions of higher education face a dizzying array of regulations. These regulations increasingly force colleges and universities to adopt stronger security measures as they combat more and more cybersecurity threats. Many of these regulations mandate two-factor authentication (2FA) to ensure that the right person is accessing sensitive information.

Read More

CJIS Compliance and Your Information Security Program

The role of mobile technologies within the field of law enforcement continues to grow in both importance and number of applications. Law officers count on these technologies for much more than simply receiving dispatch calls or looking up arrest records. Officers are using mobile devices in the field for capturing photo evidence, fingerprinting suspects at the scene, conducting interviews, issuing tickets and citations, managing personnel tracking and deployment, and much more.

Read More

PCI Compliance as Part of University Security...Why So Difficult?

While complying with the Payment Card Industry Data Security Standard (PCI DSS) can be a challenge for any organization, there are specific hurdles to compliance for higher education. 

Read More

Meeting the DFARS MFA Requirements—What You Need to Know

As we noted in two previous blog posts, the deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) data security requirements is Dec 31, 2017.

In one post, we explained the basics of the DFARS data security rules, and in the other we explored the “14 families” of security measures outlined in National Institute for Standards and Technology Special Publication 800-171 (NIST SP 800-171). 

Read More

How to Prepare for the DFARS Compliance Deadline: Part 2




As discussed in our previous blog post, the December 31 deadline for complying with data security requirements in the Defense Federal Acquisition Regulation Supplement (DFARS) is looming.

Read More

How to Prepare for the DFARS Compliance Deadline: Part 1

If you do business with the Department of Defense (DoD), get ready! After a two-year extension, the deadline for complying with the Defense Federal Acquisition Regulation Supplement (DFARS) data security requirements is fast approaching—December 31 of this year.

Read More

Subscribe Here!