
California Consumer Privacy Act (CCPA) – “America’s GDPR”
Do you do business in California or process the data of California residents? Does your business collect or track personal information regarding California residents on your website via the use of cookies or other marketing analytics? Do you have a privacy or consent notice on your website? What exactly does “personal information” really mean under [...]November 12, 2019 | Greg Michalek
Proposed NC Cybersecurity Law HB 904
On April 17, 2019, a bipartisan group of North Carolina state representatives introduced a bill that would revamp existing law and require North Carolina businesses to take proactive steps to protect North Carolina residents’ personal information from data breaches. The proposed bill, HB 904, would apply to all businesses in North Carolina and, in addition [...]May 16, 2019 | Greg Michalek
Gamification of Document Review
Fortnite, Division, Rainbow Six, Overwatch, Super Mario Odyssey – video games have become more pervasive than reality TV for many people in the last few years. ‘Water-cooler chat’ tends to be about new levels in video games rather than who got a rose or who got kicked off the island. With this cultural past time change, [...]April 12, 2019 | Caragh Landry
International Women’s Day 2019
In the future, there will be no female leaders. There will just be leaders. – Sheryl Sandberg Happy International Women’s Day! This year’s theme is #BalanceforBetter and is focusing on ‘Think Equal, Build Smart, Innovate for Change.’ Today, events all over the world will celebrate the accomplishments women have made while also acknowledging the work [...]March 8, 2019 |
The Anatomy of Business Email Compromise (BEC)
Business email compromise (BEC) is an effective cyberattack that uses deception and impersonation to steal large sums of money from organizations. If an organization relies on wire transfers to make or receive payments then, sooner or later, it will be targeted. Furthermore, successful BEC attacks are financially devastating with losses regularly exceeding $100,000. Though there […]
January 16, 2019 |
Employee Spotlight: Eric Vanderburg
Meet the Team Employee Spotlight: Eric Vanderburg Title: Vice President, Cybersecurity Location: Cleveland, OH What is the most rewarding part of the job? I love the satisfaction of a job well done, and we get the chance to work on many interesting projects. Clients come with unique scenarios, and we put together an innovative cybersecurity [...]January 3, 2019 |
Employee Spotlight: Nancy Cipriani
Meet the Team Employee Spotlight: Nancy Cipriani Title: Senior Project Director Location: Greensboro, NC Nancy Cipriani is a self-described Midwestern girl. Born and raised in Missouri, she graduated from the University of Central Missouri with a degree in Business Administration. It was after college, while working at a local law firm, that Nancy made an impression […]
December 5, 2018 |
Cyber Monday and Cybersecurity: Best Practices to Keep Data Safe
It’s that time of year again. The weather is getting colder, Starbucks has changed from pumpkin to peppermint and Christmas decorations are lining the stores (it’s only November, but that’s an argument for another day). As people are recovering from Thanksgiving, many are expected to shop online this Cyber Monday. Cyber Monday is one of [...]November 26, 2018 | Eric Vanderburg
Employee Spotlight: Joe Anguilano
Meet the Team Employee Spotlight: Joe Anguilano Title: Managing Director of Cybersecurity Location: Cleveland, OH How did you start at the company? In 2005, I was hired by JURINNOV (acquired by TCDI in 2016) as an intern during my senior year at John Carroll University. Upon graduation, I was brought on full-time as a Business Analyst. One [...]November 12, 2018 |