Skip to main content

Topic of the Week

Welcome to our "Topic of the Week" section, where we spotlight key issues in security, privacy, audit, risk, and compliance. Each week, we look into a relevant topic, offering insights and strategies to help navigating the ever-evolving landscape of regulations and best practices


  • Sensitive Data Rule - Department of Justice 2025

    As the U.S. doubles down on protecting sensitive personal and government-related data from falling into the hands of the wrong people, a new privacy regulation is on the horizon. The Department of Justice’s Sensitive Data Rule officially takes effect July 8, 2025, and this current “grace period” gives you the chance to prepare. This week we are digging into what this rule means, who it affects, and what your organization should be doing right now to prepare.

  • Oh, Nice, Another Request to Change My Password… *sighs*

    A couple of weeks ago, we talked about the massive data breach that exposed millions of logins. When I told my partner about it, and recommended he go change his passwords, he asked why, since, more than likely, his information was already out there, and it got me thinking. Usually, we are just told to change our passwords, but nobody really explains why.

  • The Hacker Figured Out My Password, Now I Have to Change My Dog's Name

    Keeping our information private in the digital age remains one of the internet’s greatest challenges, and a newly uncovered breach gives us yet another disturbing reminder.

  • The Impact of Data Breaches

    We have all heard about data breaches and understand that they are quite damaging, but do we understand how damaging they are?

  • Is Anything Real at This Point?

    Just a few weeks ago, we discussed the growing challenge job seekers face in determining whether a job posting is even legitimate. But the script has flipped… Now employers are the ones asking if the candidates they're meeting are even real. Welcome to the unsettling new trend of deepfake job applicants.

  • Digital Payment Methods - Are They Secure?

    Our digital landscape is continuously growing and within it, our phones are becoming even more of a one-stop shop. We use our phones for communication, either through text messaging or phone calls; for taking photos; for sending and receiving emails; for setting alarms; for listening to music or audio books; for reading books; for asking google questions; to access social media; and most relevant for today's topic - we use our phones in place of physical debit or credit cards.

Back to Top