Will Your Business Be GDPR Ready by May 25th?

In less than two weeks(!!!), your organization must have in place General Data Protection Regulation (GDPR) procedures and practices, especially if you do business in Europe. Or with their citizens while they are in the United States. While the legislation isn’t complicated, the process to fulfill it can be, particularly for emerging, global businesses. Here is a summation of GDPR, the results of a recent survey and a major risk when it comes to compliance. GDPR Main Points This European Union (E.U.) legislation was approved in April 2016 and replaces a previous data protection directive. It provides sweeping personal privacy […]

Read more »

11 Spring Cleaning Tips to Keep Employees Productive and Protected

Spring has sprung!  With longer days and warmer temperatures, this is the perfect time to clear the decks, change up the office space and ensure your company’s computers, mobile devices and network is protected. Set aside a half or full-day to complete this activity, ideally when everyone is at work. Make this an annual ritual. Once you have the date set, move forward with the following tasks. This blog is divided into three focus areas: Office Space, Individual Area and Computer Protection. Office Space According to CEO Space, office cleanliness has a direct impact on worker effectiveness and how client’s […]

Read more »

Meeting Planners Need to Take Cybersecurity Seriously

Newsflash: Most event organizers spend more time worrying about physical security for their conferences rather than the disruptor that can really impact it: hackers. Why? Because they think everyone else has cybersecurity handled, from the hotel to the AV/IT company they hired. Truth be told, you need to start weaving the right cybersecurity measures into your event. And not next year, next quarter or next month. You need to do it today. Hackers are constantly looking for easy-to-crack networks where data is plentiful. These bad actors have one or more agenda items in mind, including: • Stealing the identities of […]

Read more »