Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Air Canada's Temperature Testing Raises Concern for Individual Data Privacy, Explained by a Privacy Expert

In an interview with Info-Tech analysts, privacy expert Dr. Ann Cavoukian explains why Air Canada's recent mandatory temperature check policy to screen for COVID-19...

Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers....

PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data...

Webinar: Responsibly Resume IT Operations in the Office

IT must quickly identify the must-dos to allow a safe return to the office. During this webinar we will go through how to build a prioritized roadmap for safe reopening...

Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created...

New York State Leads the Charge in Upcoming Zoom Security Enhancements

The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and...

Workiva and CFGI to Collaborate in the SOX and GRC Space

“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the...

StorMagic – The Magic Bullet for Key Management?

With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for...
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us