Emergency Planning for Students with Disabilities

The state’s administrators, teachers, and aides find themselves in new and unchartered territory trying to navigate an entirely remote learning environment. Basic educational strategies that assume a face-to-face environment are now unavailable, and teachers are using new technology and products with which they had little, if any, prior experience.

Employment Checks are Not Just for Pre-Employment

How do you reduce risk, perform due diligence, and get the most qualified person for the job? With the vigorous combination of background checks and ongoing employee checks during employment, this goal can be achieved. Hire a Licensed Private Detective/Certified Fraud Examiner to conduct the pre-employment and ongoing employment checks. People Change Employee background checks are no longer just for …

30 Minutes and Your Identity is Stolen!

Within 30 minutes of searching the Internet, a fraudster can find your personal information and begin the process of stealing or compromising your identity.   Three Years to Three Months – How Soon Can You Tell If Your Identity Was Stolen? Based on Experian.com, it typically takes three months for the majority of people to discover they have been victims …

The California Consumer Privacy Act (“CCPA”) is Now Effective: What Does It Mean for Your Business?

Did you know?  The California Consumer Privacy Act of 2018 (the “CCPA”), one of the most stringent and far-reaching consumer privacy laws in the country, became effective as of January 1, 2020. The CCPA significantly expands the privacy rights of California consumers by imposing new requirements on businesses to disclose what categories of personal information will be collected, the purpose …

Finding Vulnerabilities is a Good Thing

No matter how cautious a company is in designing and defending its information security systems, there is always the potential for data breaches and cybersecurity incidents. One method to find these vulnerabilities before a threat actor does is to test your security using some of the same techniques that criminals do, first. Penetration tests cause no actual damage if conducted by a reputable professional, and can be a vital tool for understanding a particular weakness in more than Information Technology systems. 

A Risk Assessment Will Identify a Path to Success

A risk assessment is a process to uncover gaps and to document a road map for better cybersecurity practices and organizational resilience. It can often determine the cost and likelihood of an incident while quantifying the need for security spending.