Our Thoughts On Archive

Sort by

Categories
Authors

Cybersecurity

Articles 231 - 240 of 273

Is your home router hacked?

At Schneider Downs, we understand that cybersecurity threats to our clients will sometimes extend to devices and systems outside their IT purview. As the

The Rise of Business Email Compromise Scams

The Rise of Business Email Compromise Scams Business Email Compromise – or BEC – is an increasingly common scam targeting U.S. and European

One Month Away: Should You Be Preparing for GDPR?

We’re now less than a month away from the beginning of the European Union’s enforcement of the General Data Protection Regulation (GDPR), effective

The Second Line of Defense: An Overview

Risk management in any organization can be complex and difficult. Many companies address the complexity by adding layers of audit and governance, and when
Register to receive our weekly newsletter with our most recent columns and insights.

Cybersecurity for Car Dealers: Indifference Is Not a Strategy

With cyber-attacks on the rise, it is hard to go a day without hearing or reading about a massive breach or incident. What the news outlets don’t

Do You Have a DPO? You May Need One Soon

May 25, 2018, is a date with significant meaning if you’re a company that operates within the European Union or processes data that identifies EU

GDPR: Common Myths and Truths Revealed

The General Data Protection Regulation (GDPR) has been a hot topic of conversation since being adopted in April 2016. The new regulation changes how companies

Late To Comply with GDPR? Here Are Three Steps to Take Right Now.

Background The European Union’s (EU) General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The regulation is specific to the
Register to receive our weekly newsletter with our most recent columns and insights.

Payroll Personnel, Beware of W-2 Scam

The IRS has urged employers to notify their payroll department of a W-2 phishing scam that affected hundreds of organizations—and hundreds of thousands

IRS Implements Stricter Identity Proofing Process for E-Service Users

As data protection grabs center stage in our increasingly digital world, the IRS has taken steps to enhance its own digital regulation policies. One such
Register to receive our weekly newsletter with our most recent columns and insights.

contact us

Pittsburgh