• Insights & Client Success Stories

    Search All

Displaying 1-15 of 79
1 2 3 4 5
View 9
  • View 9
  • View 28
  • View 56
Relevance
  • Relevance
  • Most Recent
  • A-Z
  • Z-A

Privacy laws in the United States are constantly changing, especially as pandemic-related privacy breaches and data leakages become more frequent. We’ve provided brief overviews of several key p...

Read More

Throughout 2020, BDO Digital worked with Microsoft to produce a number of informative webinars to help companies meet the challenges of this tumultuous year. Webinars covered topics such as Managi...

Read More

January 1, 2020, ushered in a new era for data privacy in the United States when the California Consumer Privacy Act (CCPA) took effect, with enforcement beginning on July 1, 2020. If it wasn’t en...

Read More

The abrupt shift to remote work caused by the COVID-19 pandemic forced insurance companies to overhaul their cybersecurity strategies almost overnight. Companies in every industry have faced an inc...

Read More

On September 23, 2020, The National Institute of Standards and Technology (NIST) published SP-800-53 rev. 5, titled Security and Privacy Controls for Information Systems and Organizations . The pu...

Read More

Businesses have faced many acute challenges in 2020, and cyber threats rank high on that list. The COVID-19 pandemic brought abrupt business interruption and drastic revenue changes for many indus...

Read More

The technological revolution has elevated “data” to one of the most contested and vital resources in the modern global economy.  Data driven business models necessitate the collection of vast amoun...

Read More

Businesses have faced many acute challenges in 2020, and cyber threats rank high on that list. The COVID-19 pandemic brought abrupt business interruption and drastic revenue changes for many indus...

Read More

The onset of the global coronavirus pandemic coincided with a sharp rise in the number of cyber-attacks that have impacted organizations of all sizes across industries. Private equity firms are inc...

Read More

The California Consumer Protection Act (CCPA) went into effect on January 1, 2020, with the California Attorney General beginning enforcement on July 1, 2020. The CCPA represents a historic shift ...

Read More

The intersection of digital transformation and data privacy will be critical for middle market organizations as they continue to expand their digital capabilities. Data privacy is no longer an amo...

Read More

As the novel coronavirus (COVID-19) has spread worldwide over the past few months, two global megatrends have emerged in the data privacy arena: contact tracing and working from home. Both bring s...

Read More

The global healthcare industry faces unique challenges because it deals with human health, safety and mortality. Healthcare organizations amass huge amounts of confidential and sensitive personal ...

Read More

Family Offices outsource their information technology (IT) services to either local small IT firms or large professional services companies. As a result, the level of cybersecurity expertise availa...

Read More

Coronavirus (COVID-19) protocols are being implemented across the board ranging from temperature checks to wearing masks to collecting contact information before you can enter a venue. Whether you ...

Read More

All too often companies move to digitally transform data without a strategic or proactive approach to cybersecurity and data privacy. As a result of the COVID-19 pandemic, there has been a dramatic...

Read More

Businesses, their partners, vendors, and end users have been forced to rapidly change the way they work and utilize technology in response to the work from home mandate imposed by the COVID-19 pand...

Read More

Due to COVID-19 and the shelter-in-place policies, organizations are implementing remote work where possible, but for some, it’s not sustainable. The common reaction to the economic downturn tends ...

Read More

Digital Transformation in the Pandemic and Post-Pandemic Era If there were any lingering doubts about the necessity of digital transformation to business longevity, the coronavirus has silenced t...

Read More

Given the rapid rise of the inter-connected, digitized global economy, where data is the new oil, the ability to readily transfer personal data is imperative in maintaining and enhancing strong tra...

Read More

The COVID-19 pandemic has compelled many organizations to adapt to the new normal of a remote workforce. This new environment brought on additional challenges that IT, legal and compliance and remo...

Read More

Application consolidation is not likely to be a top of mind item to consider in the middle of a global pandemic such as COVID-19. However, coming out of the current state, organizations will need t...

Read More

COVID-19 has rapidly and irrevocably reshaped the global business climate. Virtually overnight, restaurants and bars have shuttered their doors to customers, transitioning to delivery and take-ou...

Read More

While video conferencing is not a new concept, the novel coronavirus (COVID-19) has caused the demand for virtual communication to be at an all-time high. As a result, many organizations had to man...

Read More

The spread of COVID-19 has pushed many organizations to adopt remote work policies. This influx in remote work has created a gap in cybersecurity standards and it’s becoming a growing concern. Cybe...

Read More

The COVID-19 outbreak could have a direct and lasting impact on organizations of all sizes. As the number of novel coronavirus (COVID-19) cases continue to climb both in the U.S. and across the...

Read More

Is your company prepared for new CMMC requirements from the U.S. Department of Defense (DoD)? This article provides an overview of the changes, the implications for U.S. Defense Prime Contractors ...

Read More

Why Privacy Compliance Matters? New regulations bring new demands to organizations of all sizes; it is necessary to properly allocate time, resources and budget to comply and remain in compliance...

Read More

About Microsoft Compliance Manager Microsoft Compliance Manager is an ongoing risk assessment tool that centralizes compliance activities. Keeping compliant is easy with Compliance Manager’s dash...

Read More

Companies sustain more annual growth when they are guided by data-driven insights. In order to unlock the full power of your data across all business processes, you need holistic enterprise informa...

Read More

The Gartner Magic Quadrant recognizes Microsoft as a top provider of Endpoint Protection Platforms. Their latest product offerings prove they have risen to the challenge that today’s threat landsc...

Read More

You cannot deny the impact of cloud computing. Many organizations have begun to leverage the cloud for a variety of reasons as it offers innovative ways to solve problems, manage risks, optimize c...

Read More

“What is the best way to protect data in Office 365?” It’s a question we’re asked all the time. While turning on tools and enabling functionality can be simple, the real challenge is planning fo...

Read More

Business Email Compromise (BEC) fraud is a growing threat for companies of all sizes and all sectors. Last year, almost 89% of companies experienced at least one email fraud attack. It was the ...

Read More

Earlier this year, the FBI released its 2018 Internet Crime Complaint Center Report (IC3) which reports on the types of cybercrime being reported to the agency and trending threats individuals a...

Read More

By Sangeet Rajan, Managing Director,  Data & Information Governance   Practice at BDO and Steve Bunnell, Partner, Co-Chair Data Security & Privacy Practice at O’Melveny Tech companies are in...

Read More

Today, virtually all industries and governments are intrinsically and fundamentally dependent on critical infrastructure. But how do you define it? A critical infrastructure can be defined as any s...

Read More

On May 25, 2018 the EU’s GDPR went into effect. This was, by far, the most aggressive and sweeping privacy law the world had seen in years. New requirements including: a) responding to individual r...

Read More

In the ever-evolving privacy landscape, the E.U.’s General Data Protection Regulation and many other country laws were only the beginning. The new California Consumer Privacy Act (CCPA), which goe...

Read More

Although organizations have accumulated more data than ever before, many businesses still struggle to understand what their data is telling them. Fraud analytics applies the latest technology and ...

Read More

We are in the middle of a tremendous period of change in how fraud investigations are conducted. This change is driven, in part, by the massive amount of data that has been collected and stored ov...

Read More

With access to sensitive customer data, the retail industry is a prime target for cyber-attacks.  In the past decade, the retail industry has undergone major shifts worldwide due to the rise of the...

Read More

The growing complexity and capacity of business’ systems are making it difficult for investigators to understand, follow, and detect fraud. As data grows exponentially and spreads outside the orga...

Read More

More than ever, healthcare has shifted to team-based care, increased specialization, and experienced an explosion of digital data alongside strict regulations for security and patient privacy. Con...

Read More

Many administrators find themselves responsible for more and more systems as companies grow. Sometimes this growth is unplanned and requires the admin to take on responsibility for systems and app...

Read More

It’s relatively common for people to prepare for when things go wrong. Many have first aid kits in the closet for the occasional injury. Some may budget for an emergency fund in case they lose the...

Read More

We’ve done a lot of cybersecurity work at BDO Digital. As you can imagine, we’ve just about seen it all. One thing we do see, unfortunately, is that most organizations don’t begin to seriously ...

Read More

In today’s world, it’s clear that managing security is a struggle for many organizations. With each passing minute, not only do the number of attacks increase, but the sophistication, scope, and a...

Read More

As our digital lives become increasingly enmeshed with our work lives, there is a concern for businesses to make sure that information is not released unintentionally via malicious means or otherw...

Read More

We live in a world where security incidents dominate headlines. The recent Facebook security breach , which exposed the accounts of 50 million users, is yet another example of how even the most h...

Read More

How safe is your healthcare data? According to The Journal of the American Medical Association, annual health data breaches increased 70% over seven years with 75% of breaches being classified as ...

Read More

We live in a culture that expects near-immediate response from our technology, wherever and whenever we need it. Technology downtime not only impacts productivity and profits, but it can also dama...

Read More

At BDO, we understand cybersecurity is a critical part of any organization’s data privacy strategy.  Privacy concerns are much farther reaching than in the past, ranging from bad actors to authoriz...

Read More

Cybersecurity Ventures predicts that by 2022, there will be 6 billion internet users (75% of the world’s population) – and more than 7.5 billion internet users by 2030 (90% of the projected wo...

Read More

In our recent Tech Insights Survey, we found that the majority of midsize organizations have accepted the reality that they are a target for a cyberattack – it's no longer a matter of if, it's a m...

Read More

At the end of June we did a “first” for BDO Digital– offer free trial services of Microsoft 365 Managed Defense to ten of our customers. This isn’t as trivial as a “first month free” gym membershi...

Read More

In our last blog, we talked about the challenges midmarket organizations face when trying to build a strong cyber defense while enabling their workforce. Despite all the attention on cybersecurity...

Read More

In today’s world, it’s clear that managing security is a struggle for many organizations. With each passing minute, not only do the number of attacks increase, but the sophistication, scope, and a...

Read More

GDPR, or General Data Protection Regulation, recently went into effect. Though the intent of GDPR is to protect the privacy of people who live in the European Union, the sweeping new regulation ap...

Read More

Exploring Security and Productivity in Microsoft 365: Teams, Skype and Power BI It has been widely established that the most vulnerable point of security failure is end users. Countless studies h...

Read More

May 25, 2018 marks the GDPR compliance deadline. The day every organization conducting business in the EU (even those not located in the EU) must adhere to the regulation on the protection of user...

Read More

In part two of our Workforce Transformation blog series, we’ll look at the second “P” of successful digital workforce transformation – Protection . In an increasingly digital world, humans have ...

Read More

Last year was a bad year for cybersecurity. Remember the Equifax breach ? Wannacry ? And more phishing attacks to count? Breaches have gotten bigger, hackers have gotten smarter, and security te...

Read More

Is Your Organization Prepared? As we approach May 25 th , many organizations are preparing for the EU’s General Data Protection Regulation, also known commonly as GDPR. This regulation applies t...

Read More

73% of cybersecurity breaches are financially motivated, according to the 2017 Verizon Data Breach Investigations Report. This means the attackers are after your organization’s data to sell on the...

Read More

The following exchange describes how security architecture decisions are made in many organizations: IT PROFESSIONAL: “We need to implement this new product or feature.” BUSINESS LEADER: “Ok...

Read More

In November 2017, the Global Cyber Alliance in partnership with IBM and Packet Clearing House launched a new service to help combat cybercrime which is free for personal and business use. It is a...

Read More

The PCI Data Security Standard (PCI DSS) has required multi-factor authentication (MFA) since its earliest versions. With the recent updates to PCI DSS v3.2 published in 2016, organizations are al...

Read More

On January 3rd, 2018, news was publicly disclosed about a pair of security vulnerabilities named “Meltdown” and “Spectre”. They are both related to hardware vulnerabilities in modern processors. ...

Read More

In my last blog, I highlighted the shortcomings of the three most common security assessments. Today, we’ll explore a way to overcome these challenges. At its most basic level, the job of any sec...

Read More

Security assessments are an essential tool in answering these three important questions: Are we secure? Where do we go from here? Which security investments will provide the most benefit ...

Read More

Windows Defender Advanced Threat Protection (Windows Defender ATP) is a security service focused on post-breach forensics and remediation on endpoints. ATP enables enterprise customers to detect, ...

Read More

Communicating via texting and email are important to providers and covered entities because texting and email are important to patients. The expectation of mobile access has become the norm in mos...

Read More

A security vulnerability was published in October 2017 that could allow hard drives protected with Bitlocker to be unencrypted, among other risks. If you count on Bitlocker to protect sensitive in...

Read More

Microsoft’s Advanced Threat Protection (ATP) is a cloud-hosted add-on to Office 365 (Exchange Online) that helps prevent zero-day malware, Advanced Targeted Attacks and phishing attacks in your em...

Read More

A new ransomware outbreak has been identified bearing similarities to WannaCry from earlier this year. Dubbed Bad Rabbit , the ransomware appears to have simultaneously infected systems in Russ...

Read More

WPA2, the security protocol used to protect the vast majority of Wi-Fi connections, has been broken by Belgian researchers, highlighting the potential for millions of devices to be exposed to mali...

Read More

The framework of the Cyber Kill Chain was developed by Lockheed Martin Corporation in 2011. Since then, organizations of all sizes have been referencing this model to manage their information secu...

Read More

Equifax said Thursday, 9/7/17, that 143 million people could be affected by a recent data breach in which cyber criminals stole information including names, Social Security numbers, birth dates, a...

Read More

Despite the wide-scale adoption of the cloud, many well-established, highly regulated sectors have been slow to migrate to the cloud due to concerns about security. Understandably, businesses gene...

Read More

The threat of cybercrime continues to rise, as criminals adapt to new security measures and take advantage of changes in user’s online behavior. The rising threat of cyber crime was made all the m...

Read More

Financial services organizations licensed by or operating in New York State must adhere to a new cybersecurity regulatory regime which went into effect on March 1st, 2017. There are a series of tr...

Read More

Despite rising security threats, we’re still seeing an alarmingly high number organizations sitting relatively still when it comes to protecting their IT systems against attacks. We hear things li...

Read More

When was the last time you did a backup on your databases? You may need to do this if you manage multiple SQL instances and are responsible for making sure backups happen for all databases. Backup...

Read More

Shadow IT refers to the practice of deploying IT systems and solutions outside of, and without the knowledge of, the IT department. As cloud applications mature, Shadow IT has grown exponentially....

Read More

By now, any company that does business in the EU is aware of the General Data Protection Regulation (GDPR) impacting all companies that handle personal data of EU citizens in the context of sellin...

Read More

Every IT environment is made up of complex and ever-changing infrastructure systems and applications that interact with and depend on each other to function. As applications continue to grow in co...

Read More

A web application firewall (WAF) recently became available as part of Azure’s Application Gateway Firewall offering. When migrating existing applications to Azure, WAF ensures web applications are...

Read More

To a large extent, U.S. businesses went unscathed from the first version of WannaCry that paralyzed 40 U.K. hospitals and other organizations across 150 countries, but the implications of WannaCry...

Read More

Friday saw the beginning of one of the largest global cyberattacks to date. The malicious software known as WannaCry quickly spread via users unknowingly clicking on an infected link, poorly confi...

Read More

You probably have heard by now, if you weren’t a victim yourself, of the phishing scam that went viral via Google Docs yesterday. Targeting Google’s estimated 1 billion users worldwide, the hack s...

Read More

In our last few blog articles, we discussed ways that Azure Information Protection (AIP) allowed data to be secured inside and outside the organization (read AIP - Manual and Automatic File Class...

Read More

In our last EMS blog post, we discussed how to protect data with Azure Information Protection (AIP). But once data is protected, how do you ensure that only the right people are accessing it?  Wha...

Read More

In the last blog of the EMS blog series, we talked about Microsoft Cloud App Security for monitoring and managing your cloud applications. Today, we're rounding out the features of Azure AD Premiu...

Read More

As we mentioned in the last blog about Single Sign On for Cloud Apps, the number of cloud-based applications is growing exponentially. As a result, it is almost a certainty many of your users are ...

Read More

As the mobile workplace becomes more and more common in the corporate environment, usernames and passwords are often not enough to protect an organization’s network. Just as we discussed in our "S...

Read More

In our last blog, we introduced the 5 products of Enterprise Mobility + Security.  Today, we'll dive deeper into the first product -- Azure Directory Premium -- by looking at one of its most commo...

Read More

Welcome to our blog series on Microsoft’s Enterprise Mobility + Security (previously the Enterprise Mobility Suite).  This suite of products (known as EMS) provides a number of features to enhance...

Read More

Knowing the difference between vulnerability assessment and penetration testing is critical when hiring an IT Security Management Firm to perform a security assessment. In this blog, we expl...

Read More

In an ever changing world where security has become more and more of a consideration in all aspects of technology, one area that we are asked about frequently at BDO Digital is email encryption. F...

Read More
Displaying 1-15 of 79
1 2 3 4 5
View 9
  • View 9
  • View 28
  • View 56
Relevance
  • Relevance
  • Most Recent
  • A-Z
  • Z-A