Cybersecurity Awareness, Data Privacy Day Month from SACS consulting post

Blockchain + Cybersecurity = Ohio SB 220

Senate Bill 220, the Data Protection Act, went into law on November 2, 2018. This legislation will provide a legal safe harbor to entities that implement a specified cybersecurity program and will allow transactions and contracts recorded through blockchain technology under the Uniform Electronic Transactions Act to be protected. It’s an affirmative approach to action …

Continue reading

cybersecurity, cyber hackers, cyber crime, cybersecurity trends

Meeting Planners Need to Take Cybersecurity Seriously

While physical security is essential at meetings, events, and conventions, cybersecurity is equally as necessary, and it isn’t the responsibility of the hotel, IT, or AV company. The burden is on you and you alone. Why? Hackers are constantly looking for easy-to-crack networks where data is plentiful. These bad actors have one or more agenda …

Continue reading

Trucking Terrorism in Nice France 2016

How Organizations Can Address the Rise in Trucking Terrorism

The Transportation Security Administration (TSA) warns the US trucking industry to be vigilant to protect themselves against the escalation of ramming attacks. Trucks are now terrorists’ number one weapon. They are readily available and, in some cases, easy to obtain. Used in France and Germany in 2016 as ramming tools, trucks are also the perfect …

Continue reading

background check, background checks

3 Reasons to Run a Pre-Employment Background Check

A background check is a crucial pre-employment screening step before hiring an applicant. Many business owners or managers often assume that the applicants are telling the truth on their resumes. While most of the time, applicants are honest, according to Job Hunt, 10% of the surveyed workforce have lied or embellished the truth on their resume, cover …

Continue reading

social media, social media privacy

Social Media Security Tips

Always think about safety and security FIRST! The use of social media is like letting someone into your personal and professional “house”. It needs vigilant safeguarding and protection. Think carefully about: Who would you let into your house? When would you let them into your house? How would you secure your house? Would you let …

Continue reading