The IRS now requires that every tax preparer that files electronic returns must have a Cyber Security Plan in place. For months our customers have asked us to provide a quality solution that (1) Addresses key IRS Cyber Security requirements and (2) is affordable for a small office. Today we announced the release of our […]
Category Archives: acceptable use policy
Many of our Information Shield customers are asking how to address “Shadow IT” within their information security policy programs. In this article we will identify the common risks with unapproved IT devices and services and how to address them in your governance and security policy framework. What is “Shadow IT”? In short, “shadow IT’ is […]
In January 2013, the Federal Financial Institutions Examination Council (FFIEC) posted a set of proposed guidelines for financial institutions to maintain compliance in the world of social media. The document entitled “Social Media: Consumer Compliance Risk Management Guidance,” includes a number of specific recommendations for financial institutions that must protect customer information. The FFIEC security […]
In August of 2010, the social network IT Toolbox released their latest study on the use of mobile and social media technologies in the enterprise. The survey included over 2200 IT professionals from 109 different countries. One of the areas of the survey included questions about corporate guidance and security policies. While Social media use […]