Data breaches are as prevalent as ever, with news of large-scale breaches such as Facebook and insurance company Anthem — which recently paid out $16 million over a 2015 data breach — popping up on the news nearly every week. Medical practices, though not necessarily large targets like major corporations, are often easier targets because of their abundance of rich personal and financial data available.

Read more: 5 Tips to Help Prevent HIPAA-Related Data Breaches

Author: David Marinelli

The General Data Protection Regulation (GDPR) has dramatically changed the data protection landscape for EU businesses and citizens when it came into effect on May 25, 2018. This new regulation has superseded the Data Protection Act (DPA) of 1998 and has strengthened data privacy in the EU. Personal data held by organisations on EU citizens is now subject to a strict compliance regime that gives these citizens control over their personal data, the justification for holding the data and the right to erasure or rectification of that data.

Read more: GDPR – Our Experience

On 22nd February 2018 mandatory data breach notification (Notifiable Data Breaches Scheme) obligations came into effect. This scheme, arising out of amendments to the Privacy Act 1988 (Cth), requires organisations to notify individuals whose personal information is involved in data breach and recommend the steps they should take in response to the breach. Therefore, as individuals and business owners it is vital to ensure that you understand your rights and responsibilities under this new scheme.

Read more: Understanding the Notifiable Data Breaches Scheme

Author: Dennis Grady, Jr.

The technology industry has come a long way from the dot-com era of the mid-1990s to early 2000s. Since Silicon Valley’s rise to fame, research parks, technology centers, universities and incubators across the country have emulated its success — becoming breeding grounds for highly sophisticated start-ups and game-changing innovations across industries.

The potential for exponential returns makes technology starts-ups an attractive option for investors. But while these entities share some similarities with traditional small businesses, they also come with a unique set of circumstances. Long lead time to see profits (if they ever come), a life cycle flush with active fundraising, and special considerations for entity structure and the ultimate exit are just a few of the challenges to overcome.

Read more: What to Consider When Investing in a Tech Start-Up

By: Bill Harrington

Hackers in the News

When large, brand-name companies like Target, Anthem and Home Depot are breached by hackers, they make front-page news and incur significant reputational losses. The amount of money that hacked companies spend to repair their reputation in the marketplace is staggering, which is why this is a topic of discussion on most Board agendas. Every day, hackers become faster and more sophisticated at exploiting newly-identified vulnerabilities in security architectures. These are not the hackers of the past, teenagers fishing around for information from a computer in their basement. They are highly educated and technically savvy individuals who hack into companies for the purpose of stealing information that can be resold on the “black market.” These breaches may also take the form of attacks from nation-states that seek to acquire industrial, military, or other confidential or classified information. What about your company? How prepared is your IT security plan to prevent such a breach?

Read the entire article.