Security Archives - Wylie Blanchard Wylie Blanchard | Business Technology Expert, Digital Executive Advisor & Speaker - Wylie Blanchard Sun, 11 May 2025 06:17:54 +0000 en-US hourly 1 /wp-content/uploads/cropped-Wylie-Blanchard-profile-photo_202008_IMG_7092_1100x1100-32x32.jpg Security Archives - Wylie Blanchard 32 32 61397150 Illinois Privacy Compliance: What Every Business Owner Needs to Know https://wylieblanchard.com/illinois-privacy-compliance-what-every-business-owner-needs-to-know/ Sun, 01 Jun 2025 08:26:00 +0000 https://www.wylieblanchard.com/?p=8974 The Rising Stakes of Data Privacy. Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you. In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Silhouette of the state of Illinois with digital icons

The Rising Stakes of Data Privacy.

Whether you’re running a family-owned retail shop, growing a medical practice, or managing multiple office locations, if you handle customer or employee data, privacy compliance applies to you.

In Illinois, two of the strictest privacy laws in the country—the Biometric Information Privacy Act (BIPA) and the Personal Information Protection Act (PIPA)—create clear legal obligations that can cost thousands (or millions) if ignored.

As an IT consultant who works with small and midsize businesses across the state, I’m here to break down what you need to know and how you can protect your business before problems arise.

Understanding Key Illinois Privacy Laws

Biometric Information Privacy Act (BIPA)

BIPA regulates how private businesses collect, use, and store biometric data like fingerprints, facial scans, and retina scans. It requires:

  • Informed written consent before collecting or storing biometric data.
  • Disclosure of the specific purpose and storage duration.
  • public retention and destruction policy.
  • A strict prohibition on selling or profiting from biometric data.
  • Private right of action, meaning individuals can sue your business for violations.

Even something as common as a fingerprint time clock or facial recognition camera falls under BIPA. Penalties and fines can be applied for violations of negligence, recklessness or intentional action.

Personal Information Protection Act (PIPA)

PIPA focuses on safeguarding broader categories of personal data, including Social Security numbers, driver’s license numbers, medical and health insurance information, account numbers, and login credentials.

It requires:

  • Prompt breach notification to affected Illinois residents.
  • Reporting breaches to the Illinois Attorney General (if 500+ individuals are impacted).
  • Reasonable security measures to protect data.
  • Proper disposal of sensitive data.
  • Contracts with third parties that require them to maintain security.

Violations are considered unlawful practices under the state’s Consumer Fraud Act and can result in enforcement actions.

Common Compliance Pitfalls

Despite the legal requirements, many businesses unintentionally fall short. Here are some of the most common missteps:

  • Using biometric time clocks without proper notice or consent.
  • Collecting customer or employee data without a written policy or retention schedule.
  • Failing to implement encryption, firewalls, or access controls.
  • Assuming that cloud storage providers automatically ensure compliance.
  • Not having an incident response plan or breach notification process.

Often, the biggest risk comes not from bad intentions but from lack of awareness.

Steps Toward Compliance: IT Consultant’s Checklist

Here is a practical checklist to help your business align with Illinois privacy laws:

  1. Audit Your Data: Know what types of personal and biometric data you collect, where it’s stored, who has access, and how long you keep it.
  2. Create a Written Privacy Policy: Include clear language about data collection, usage, retention, and destruction.
  3. Implement Consent Procedures: Obtain written consent before collecting biometric data and explain how it will be used.
  4. Secure Your Systems: Use encryption, secure user authentication, regular patching, and monitoring to protect stored data.
  5. Train Your Employees: Ensure your staff understands data privacy procedures and how to respond to data incidents.
  6. Plan for Breaches: Develop and test an incident response plan, including breach notification protocols.
  7. Review Vendor Contracts: Make sure service providers who access your data agree to meet your security requirements.

The Cost of Non-Compliance

Non-compliance isn’t just a legal problem—it can be a business-ending event. Illinois courts have upheld massive BIPA settlements, with some cases costing businesses millions in damages. A single fingerprint scan collected without consent can lead to multiple violations, each carrying its own penalty.

With PIPA, a data breach could force you to notify thousands of customers, face scrutiny from the Attorney General, and deal with damaged customer trust.

Tools and Tech That Can Help

Fortunately, the right tools can make compliance manageable:

  • Consent management platforms to track and store written consents.
  • Data loss prevention (DLP) software to monitor sensitive information.
  • Security information and event management (SIEM) tools for real-time alerts.
  • Encryption solutions for both stored and transmitted data.
  • Automated backups with secure, offsite storage.

Don’t overlook free or low-cost training platforms to keep your team informed.

Make Privacy a Business Priority

Privacy compliance isn’t a one-time fix—it’s an ongoing responsibility. If you collect any form of personal or biometric data, you are legally and ethically responsible for protecting it.

By investing in secure systems, clear policies, and proper staff training, you’re not just avoiding fines—you’re building customer trust and long-term resilience.

If you’re unsure where to start or whether your current practices meet Illinois standards, now is the time to act.

Local IT consultants, privacy professionals can help you:

  • Audit your systems and data handling practices
  • Develop legally sound policies and consent forms
  • Deploy the right technologies for security and monitoring
  • Train your team to maintain compliance

Don’t wait until a lawsuit or a breach that forces your hand. Reach out to a trusted local technology expert today and take control of your privacy compliance strategy.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8974
The Scammers Almost Got Me https://wylieblanchard.com/the-scammers-almost-got-me/ Sat, 26 Apr 2025 08:53:00 +0000 https://www.wylieblanchard.com/?p=8964 They almost got me. A week ago, we filed a new trademark application.Yesterday morning, we got an email.Looked official.Said a few items were missing from the application.Said we needed to send info to the USPTO. All day, I was thinking about that email.Telling myself, get the info together.Don’t want to mess up the process.Don’t want […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Laptop computer displaying an email message. in the background Alarm bell ringing in foreground. Image text: Phishing Attempt

They almost got me.

A week ago, we filed a new trademark application.
Yesterday morning, we got an email.
Looked official.
Said a few items were missing from the application.
Said we needed to send info to the USPTO.

All day, I was thinking about that email.
Telling myself, get the info together.
Don’t want to mess up the process.
Don’t want our application rejected.

Last night, I looked at the email again.
Something felt off.
Email address? Looked funny.
Didn’t have the right domain.
No links. No instructions.
Just the USPTO logo. That’s it.

So I went straight to USPTO.gov.
Logged in. Checked the application.
Nothing missing. No errors.
Everything looked fine.

Then I found the real email from USPTO when I first applied.
It said—watch out for scams.
Said all emails would come from USPTO.gov.

That email I got yesterday morning?
Didn’t have that domain.
Scam.

Took it a step further.
Used WHO.IS to check the sender’s domain.
Domain was created yesterday.
Classic scam move.

They almost got me.
But not in this attempt.

If I had been rushing yesterday morning…
If I had replied with info…
I would’ve given them sensitive details about me and our business.
Worse—I would’ve shown them I’m willing to communicate.

They could’ve kept emailing us.
Asking for more.
And I might’ve sent it.

So—watch those email addresses.
Check the content.
Don’t rush.


This content was originally posted on Medium

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8964
Beyond Certifications – The Cybersecurity Skill That Sets Leaders Apart https://wylieblanchard.com/beyond-certifications-the-cybersecurity-skill-that-sets-leaders-apart/ Sat, 08 Feb 2025 12:16:00 +0000 https://www.wylieblanchard.com/?p=8906 Certifications Open Doors, But They Don’t Make You Boardroom-Ready. I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Certifications Open Doors, But They Don’t Make You Boardroom-Ready.

Finger Holding Badge with text certified trust me

I’ve met countless professionals who believe that earning certifications like CISSP, CISM, Security+, etc. is the key to advancing their careers. And while certifications are valuable—they demonstrate expertise, commitment, and a solid understanding of best practices—there’s one critical skill they don’t teach: how to communicate security and technology risks in a way that leadership understands.

I have several myself: CISSP, PMP, ITIL, MCSE and more — each one has helped me gain deeper technical knowledge and industry credibility. But none of them, on their own, prepared me for the real challenge of leadership: translating complex security concepts into business priorities.

A few weeks ago, I spoke with a colleague who had just completed a major certification. He was feeling confident about his technical knowledge, but then he walked into a leadership meeting and was asked to explain why his team’s proposed security initiative mattered to the business. He knew the technical details inside and out, but when it came to making the case to executives—framing security as a business priority rather than a technical challenge—he struggled.

That moment made it clear: Certifications don’t prepare you for the real challenges of leadership.


The Gap Between Certifications and Real-World Leadership

Certifications focus on frameworks, methodologies, and compliance—which are important. But in the real world, professionals must be able to:

  • Translate security risks into business impact.
  • Justify IT investments in terms of ROI.
  • Persuade leadership to prioritize security initiatives.

I’ve seen too many skilled IT professionals hit a ceiling in their careers—not because they lack knowledge, but because they struggle to communicate complex ideas in a way that decision-makers care about.

For example, if you’re discussing Zero Trust security with your executive team, you need to go beyond saying,

“Zero Trust limits network access to reduce attack surfaces.”

Instead, translate that into business terms:

Zero Trust ensures that only the right people have access to critical systems, reducing the likelihood of a data breach that could cost us millions in fines and lost customer trust.

This shift in communication changes the conversation—and ultimately determines whether your initiatives get the support they need.

Three Skills Every Cybersecurity and IT Leader Needs

If you want to stand out and drive real change, focus on developing these three essential leadership skills:

1. Storytelling & Business Impact

Leaders don’t respond to jargon and technical specs—they respond to narratives that connect security to real business challenges.

  • Instead of saying: “We need to implement multi-factor authentication (MFA) to strengthen security.”
  • Say: “Over 80% of breaches come from weak passwords. MFA would immediately reduce our risk of unauthorized access, protecting both our data and our reputation.”

The difference? One statement sounds like an IT upgrade. The other sounds like a business necessity.

2. Risk-Based Decision Making

Security isn’t about eliminating all risks—it’s about prioritizing the most critical ones without disrupting operations.

  • Understand risk appetite — how much risk your company is willing to tolerate.
  • Learn how to quantify risk in dollars — leaders want to know what a security failure could cost the business.
  • Frame recommendations in terms of business value, not just security best practices.

Example: Instead of saying, “This patch reduces vulnerabilities,” explain, “This patch could prevent an outage that would cost us $50K in lost revenue per hour.”

3. Stakeholder Influence & Negotiation

Your ability to secure buy-in for security initiatives determines whether they actually get implemented.

  • Speak the language of finance, operations, and executive leadership—not just IT.
  • Identify the real drivers behind security decisions (often compliance, customer trust, or financial impact).
  • Build relationships before you need them—so when a crisis arises, decision-makers already trust your expertise.

If you can’t convince the CFO or CEO why security investments matter, even the best technology solutions will go underfunded or deprioritized.

How to Develop These Skills (Beyond Certifications)

So, how do you bridge the gap between technical expertise and executive influence?

  1. Start practicing now. Present security insights to non-technical colleagues and get feedback on clarity.
  2. Study leadership communication. Take courses on storytelling, negotiation, and business strategy.
  3. Follow cybersecurity leaders who articulate security in business terms—watch how they frame discussions.
  4. Get involved in executive-level conversations. Don’t just sit in IT meetings—engage with finance, operations, and leadership.

The professionals who stand out are the ones who combine technical depth with the ability to communicate its value to the business.


Certifications prove what you know—but your ability to connect security to business priorities is what sets you apart.

If you’re serious about advancing in cybersecurity or IT leadership, ask yourself:
Are you just learning technical frameworks, or are you preparing to lead?

Tech skills get you in the door. Communication skills put you at the table.

Are you ready for that next-level conversation?


This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8906
From NPD to the Cloud: Why Businesses Must Prioritize Cybersecurity Now https://wylieblanchard.com/from-npd-to-the-cloud-why-businesses-must-prioritize-cybersecurity-now/ Sat, 14 Sep 2024 11:24:00 +0000 https://www.wylieblanchard.com/?p=8844 The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Data Codes through Eyeglasses

The recent National Public Data (NPD) breach, which compromised the personal information of over a million individuals, serves as a stark reminder of the ever-growing need for strengthened cybersecurity measures. As organizations increasingly rely on digital platforms to store sensitive data, the importance of cybersecurity cannot be overstated. Data breaches are no longer isolated incidents—they have become a significant, ongoing threat to businesses and their customers. With the rapid evolution of technology, companies must prioritize the implementation of robust cybersecurity frameworks to safeguard their operations, protect consumer trust, and ensure long-term business continuity.

The NPD Breach: A Wake-Up Call for Cybersecurity

The NPD incident was a clear demonstration of how vulnerable even large, data-driven organizations can be to cyberattacks. Although the breach reportedly impacted 1.3 million individuals, some experts argue the actual scale of the compromise might be larger, considering the 2.9 billion records reportedly exposed on the dark web. This gap between the company’s official disclosure and the broader cybersecurity community’s findings highlights a recurring challenge: many organizations underestimate the extent of their vulnerabilities until it’s too late.

In the wake of such incidents, businesses must ask themselves: Are we doing enough to protect our digital assets? Data breaches like the NPD case underscore the importance of taking proactive measures to avoid devastating consequences, such as financial losses, damaged reputations, and loss of consumer trust.

Why Cybersecurity is Critical for Today’s Businesses

Businesses today operate in an increasingly complex digital landscape. From financial institutions to healthcare providers, nearly every industry depends on digital infrastructure to facilitate daily operations, communicate with clients, and store critical data. However, this reliance on technology comes with its own set of risks.

Cybercriminals are becoming more sophisticated, leveraging advanced techniques to exploit vulnerabilities in systems. They target weak spots, from outdated software to poorly configured cloud platforms, and the consequences of these attacks can be catastrophic. According to the IBM and Ponemon Institute’s 2024 Cost of a Data Breach Report, the global average cost of a data breach increased to USD 4.88 million in 2024, marking a 10% increase over the previous year. Business disruption and the costs associated with post-breach responses, such as customer support and regulatory compliance, contributed to this significant rise. For small businesses, these figures could result in bankruptcy or closure. This is why cybersecurity has evolved from a technical concern to a strategic business priority.

The Long-Term Costs of Data Breaches

Beyond the immediate financial impact, the long-term effects of data breaches can be equally damaging. Businesses may face legal repercussions, including fines and lawsuits from customers whose data has been compromised. Additionally, regulatory bodies such as the California Consumer Privacy Act of 2018 (CCPA), the state of Illinois’ Personal Information Protection Act (PIPA) or the Biometric Information Privacy Act (BIPA) can impose strict penalties for non-compliance with data protection standards.

A breach can also severely damage a company’s reputation. Consumers are increasingly aware of the importance of data security, and a company’s failure to protect their information can lead to a loss of trust. When customers no longer feel secure doing business with a company, they take their business elsewhere, further eroding the company’s market share.

Moreover, data breaches disrupt operations. Recovery efforts often involve halting production, isolating systems, and launching extensive investigations. This downtime can significantly hinder a company’s ability to serve its customers, exacerbating the damage caused by the breach.

Proactive Cybersecurity Measures

To avoid the far-reaching consequences of a data breach, organizations need to adopt proactive cybersecurity strategies. The following measures can help businesses mitigate risks and strengthen their defenses:

1. Comprehensive Risk Assessments
Businesses must regularly conduct thorough risk assessments to identify potential vulnerabilities within their digital infrastructure. These assessments should not only focus on internal systems but also include third-party vendors and partners who have access to company data. A well-rounded risk assessment allows businesses to prioritize cybersecurity investments and focus on areas that present the highest risk.

2. Multi-Factor Authentication (MFA)
A simple yet effective security measure, multi-factor authentication adds an extra layer of protection by requiring multiple forms of verification before granting access to sensitive systems. This reduces the likelihood of unauthorized access, even if a password is compromised.

3. Regular Software Updates and Patching
Cybercriminals often exploit known vulnerabilities in outdated software. Ensuring that all systems are regularly updated and patched is critical to closing these gaps. Organizations should have a clear patch management process in place, with designated personnel responsible for monitoring and implementing updates.

4. Employee Training and Awareness
One of the most common ways cyberattacks occur is through human error. Phishing schemes and social engineering tactics exploit untrained employees to gain access to sensitive information. To combat this, businesses must invest in continuous cybersecurity training programs that educate employees on the latest threats and how to recognize them.

5. Data Encryption
Encrypting sensitive data ensures that, even if a breach occurs, the stolen information is unreadable to unauthorized users. Businesses should implement encryption protocols both for data at rest (stored data) and data in transit (information being sent between systems).

6. Incident Response Planning
Having a robust incident response plan in place can help businesses quickly address and mitigate the effects of a breach. An effective plan should include clear protocols for isolating compromised systems, notifying affected stakeholders, and conducting forensic analysis to determine the scope of the breach. Regular testing of the incident response plan ensures that all team members are familiar with their roles in the event of a breach.

The Role of Cloud Security

With the shift towards cloud computing, businesses are increasingly relying on cloud providers to store and manage their data. However, cloud environments present their own unique set of challenges. Data breaches in cloud infrastructures can occur due to misconfigurations, lack of encryption, or insecure APIs. Therefore, organizations must ensure they partner with reputable cloud providers who offer robust security measures, such as encryption, regular monitoring, and adherence to industry standards.

It’s also critical for businesses to maintain visibility and control over their cloud environments. Implementing cloud security tools, such as cloud access security brokers (CASBs), can help organizations monitor and enforce security policies across cloud services. These tools offer real-time visibility into user activities, identifying potential threats before they can escalate into full-blown breaches.

Learning from the NPD Breach: The Need for Transparency

One of the lessons businesses can learn from the NPD breach is the importance of transparency. In many cases, companies are hesitant to disclose breaches until they have a complete understanding of what happened. However, this approach can delay critical responses, such as notifying affected individuals or taking action to prevent further damage.

Transparency and timely reporting are not just ethical obligations—they are also critical components of crisis management. Customers need to be informed promptly if their data has been compromised so that they can take steps to protect themselves. Moreover, regulatory agencies often require timely disclosures, and failure to comply can result in additional penalties.

The Future of Cybersecurity: Evolving with the Threats

Cyber threats are constantly evolving, which means businesses must remain vigilant and adaptive. Cybersecurity is not a one-time investment; it requires continuous updates, monitoring, and strategic planning. As artificial intelligence (AI) and machine learning (ML) become more integrated into cybercriminals’ arsenals, businesses will need to leverage these same technologies to defend against sophisticated attacks.

By adopting a forward-thinking approach to cybersecurity, businesses can stay one step ahead of cybercriminals, protecting both their operations and their customers. In today’s digital world, investing in cybersecurity is not just about avoiding breaches—it’s about building a resilient organization that can thrive in the face of adversity.


The NPD breach is a reminder that no organization, regardless of size or industry, is immune to cyberattacks. Strengthening cybersecurity requires a proactive, comprehensive approach that addresses both technological vulnerabilities and human factors. By implementing robust cybersecurity strategies, businesses can protect themselves from the ever-present threat of data breaches, safeguard their customers, and secure their future in the digital economy.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8844
Essential Disaster Preparedness Strategies: Safeguarding Your Business https://wylieblanchard.com/essential-disaster-preparedness-strategies-safeguarding-your-business/ Sun, 18 Aug 2024 15:20:00 +0000 https://www.wylieblanchard.com/?p=8826 Discover essential disaster preparedness strategies for businesses, including risk assessment, disaster recovery plans, IT infrastructure investment, regular testing, and leveraging advanced technology. Ensure your business's resilience and continuity in the face of natural disasters.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
Frustrated Man in Front of a Laptop

Recent tornadoes in Chicago and the surrounding suburbs have starkly highlighted the urgent need for businesses to enhance their disaster preparedness strategies. The destructive storms caused widespread power outages, significant infrastructure damage, and disrupted operations for numerous businesses. These events underscore the vulnerabilities in existing systems and the necessity for robust disaster recovery plans. Being prepared for such unforeseen events is critical to building resilience and ensuring continuity.

The recent tornadoes, which resulted in significant damage and power outages, serve as a stark reminder of the potential for natural disasters to disrupt business operations. As businesses in the affected areas work to recover, the importance of comprehensive disaster preparedness becomes evident. Ensuring that a business can withstand and quickly recover from such events is essential to maintaining operations and minimizing financial loss.

Here are some recommendations for businesses across the Midwest:

Assess and Prioritize Risks

Begin by identifying potential risks specific to the business and geographic location. The recent tornadoes, which caused extensive damage and power outages, underscore the importance of this step. Conduct a thorough risk assessment to prioritize threats based on their likelihood and potential impact on operations.

Develop a Comprehensive Disaster Recovery Plan

A robust disaster recovery plan is essential for minimizing downtime and ensuring business continuity. The plan should include:

  • Data Backup and Recovery: Regularly back up critical data and ensure that backups are stored offsite or in the cloud. This prevents data loss in the event of physical damage to premises.
  • Communication Strategy: Establish clear communication protocols to ensure all stakeholders are informed during a disaster. This includes updating contact information and having alternative communication channels in place.
  • Operational Continuity: Identify key business functions and outline procedures for maintaining these operations during disruptions. This includes having contingency plans for IT infrastructure, supply chain management, and customer service.

Invest in Reliable IT Infrastructure

Modern businesses rely heavily on technology, making IT infrastructure a critical component of disaster preparedness. Cloud services can ensure that IT systems are resilient, scalable, and secure. Important aspects include:

  • Cloud Migration: Transition critical applications and data to the cloud to enhance accessibility and reduce the risk of data loss.
  • System Redundancy: Implement redundant systems to ensure that if one system fails, another can take over without disrupting operations.
  • Cybersecurity Measures: Protect IT infrastructure from cyber threats with advanced security solutions, including firewalls, intrusion detection systems, and regular security audits.

Regular Testing and Training

A disaster recovery plan is only effective if it is regularly tested and updated. Conduct regular drills to ensure that all employees are familiar with their roles and responsibilities during a disaster. Comprehensive training programs can prepare the team for various disaster scenarios.

Leverage Technology for Enhanced Preparedness

Utilize advanced technologies to enhance disaster preparedness efforts. Solutions include:

  • Business Intelligence and Analytics: Use data analytics to monitor risks and make informed decisions during a crisis.
  • Automation Tools: Implement automation to streamline disaster recovery processes, such as automated backups and failover systems.
  • Virtual Dashboards: Access real-time information and insights through virtual dashboards that help monitor the status of business operations during a disaster.

Collaborate with Experts

Partnering with experts ensures that disaster preparedness strategies are comprehensive and up-to-date. Professionals with extensive experience in business continuity planning, IT support, and cloud services can work closely with businesses to develop customized solutions that meet unique needs.

Disasters can strike at any time, but with a proactive approach, businesses can be prepared to handle any challenge. Building resilience and ensuring continuity is essential for safeguarding business operations and minimizing financial loss.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8826
GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard https://wylieblanchard.com/giac-security-leadership-gslc-was-issued-by-global-information-assurance-certification-giac-to-wylie-blanchard/ Sat, 17 Feb 2024 11:30:00 +0000 https://www.wylieblanchard.com/?p=8490 View my verified achievement from Global Information Assurance Certification (GIAC). GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024. The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Global Information Assurance Certification (GIAC).

GIAC Security Leadership (GSLC) logo

GIAC Security Leadership (GSLC) was issued by Global Information Assurance Certification (GIAC) to Wylie Blanchard on February 14, 2024.

The GIAC Security Leadership (GSLC) certification validates a practitioner’s understanding of governance and technical controls focused on protecting, detecting, and responding to security issues. GSLC certification holders have demonstrated knowledge of data, network, host, application, and user controls along with key management topics that address the overall security lifecycle.

Learn more.

Skills:

Access Control, Change Management, Cyber Defense, Incident Handling, Information Security, IT Business Management, Leadership, Network Security, Project Management, Risk Management, Security Operations, Security Policy, Software Security, and Vulnerability Management.

Earning Criteria:

  • Accept GIAC’s Code of Ethics.
  • Acquire skills via industry experience or from a training course.
  • Achieve a passing score on the GSLC exam.

Analyst Number:
13012

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8490
ITIL® Leader: Digital and IT Strategy was issued by AXELOS to Wylie Blanchard https://wylieblanchard.com/itil-leader-digital-and-it-strategy-was-issued-by-axelos-to-wylie-blanchard/ Mon, 29 Jan 2024 03:55:04 +0000 https://www.wylieblanchard.com/?p=8428 View my verified achievement from Axelos. ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024. ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from Axelos.

ITIL 4 ® ITIL LEADER Digital IT Strategy by Axelos logo

ITIL® LEADER Digital and IT Strategy (DITS) was issued by AXELOS to Wylie Blanchard on January 28, 2024.

ITIL 4® Leader Digital and IT Strategy (DITS) demonstrates the individual has the practical understanding and application of crafting a digital vision and strategy, shaping and integrating IT and business strategies aligned with the wider organizational goals to enable success of the business. They develop cross-functional digital strategy, elevate discussions to strategic levels, drive operational excellence, analyze and respond effectively to VUCA factors.

Learn more.

Skills:

Adaptability, Agile Ways Of Working, Business Case Development, Business Change Management, Business Plan Development, Collaboration And Teamwork, Communication, Creation and Implementation of Target Operating Models, Creativity, Customer Service Management, Data Management, DevOps Methodology Knowledge, Digital Design (including UX and UI), Digital Technology Architecture, Driving Company Culture Change, Education and Training Provision, Emerging Technology Monitoring, Emotional and Social Intelligence, Enterprise Architecture, Financial Management, Information Analysis, Information Security Management, Information Security Strategy Development, Information Systems Governance, Innovation, Knowledge Management, Leadership Development, Negotiation, Planning And Organisation, Problem Solving, Product Development, Product Management, Project – Programme and Portfolio Management, Risk Management, Robotics and Automation Engineering, Service Delivery and Management, Software Development And Management, Stakeholder Management, Strategic Planning, Supplier Management, Sustainable Management, Systems Development and Management, Systems Engineering, UX Design, Experience and Support.

Earning Criteria:

  • Obtained the ITIL 4 Foundation certification designation prior to studying for ITIL LEADER Digital and IT Strategy.
  • Meet the managerial experience requirement.
  • Complete required training.
  • Complete and receive a passing score on four case study assignments.
  • Passed the ITIL 4 ® LEADER Digital and IT Strategy (DITS) exam.

Evidence:

Certification Number
GR679004963WB

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8428
Security and Privacy Best Practices for Safeguarding Member Data in Non-Profit Organizations https://wylieblanchard.com/security-and-privacy-best-practices-for-safeguarding-member-data-in-non-profit-organizations/ Sat, 02 Sep 2023 23:53:00 +0000 https://www.wylieblanchard.com/?p=8225 In today’s digital age, non-profit organizations have embraced technology to streamline their operations and enhance member engagement. However, the increasing reliance on digital platforms also brings about the critical responsibility of ensuring the security and privacy of member data. As data breaches become more prevalent and regulations evolve, it’s paramount for non-profits to implement robust […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
#h5ap9f77cded .plyr{justify-content: ;--plyr-color-main: #4a5464; --plyr-color-bg: #EEEEEE}#h5ap9f77cded .h5ap_standard_player {width: 100%;}#h5ap9f77cded .plyr__controls {background: #EEEEEE;border-radius:0px}#h5ap9f77cded .radius{border-radius: 0px}#h5ap9f77cded .skin_default .plyr__control,#h5ap9f77cded{--theme-skin-wave-color: #4a5464;}
Woman Using Macbook Pro

In today’s digital age, non-profit organizations have embraced technology to streamline their operations and enhance member engagement. However, the increasing reliance on digital platforms also brings about the critical responsibility of ensuring the security and privacy of member data. As data breaches become more prevalent and regulations evolve, it’s paramount for non-profits to implement robust security practices and frameworks to protect their members’ sensitive information.

1. Privacy Regulations and Compliance

Before delving into security practices, it’s essential to be well-versed in the relevant data protection regulations. The General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States are two prominent examples. But the landscape is rapidly evolving. As of August 1, 2023, nine US states have passed comprehensive data privacy laws. These laws may vary significantly, so it’s crucial to stay informed and compliant. Bloomberg’s State Privacy Legislation Tracker provides an insightful overview of these developments.

2. Data Minimization

Collecting only the data necessary for your organization’s operations is key. Avoid the temptation to amass excessive or irrelevant information about your members. Minimizing data collection not only reduces security risks but also enhances your members’ trust in your organization.

3. Access Control

Implement strict access controls to restrict who can access member data. Role-based access control (RBAC) ensures that only authorized personnel can view and manage the data, limiting potential breaches caused by unauthorized access.

4. Encryption

Data security is greatly bolstered by encryption. Encrypt data both when it’s stored and when it’s transmitted. Utilize protocols like HTTPS for data transmission and encryption tools for secure data storage.

5. Regular Audits and Monitoring

Vigilance is crucial in maintaining data security. Conduct regular security audits and monitoring to swiftly detect unauthorized access or suspicious activities. Intrusion detection systems can provide early alerts to potential breaches. The frequency of these audits may be determined by local regulations and the expectations of your members.

6. Secure Development Practices

When developing software or applications that handle member data, adhere to secure coding practices. This includes validating inputs, avoiding known vulnerabilities, and leveraging frameworks with strong security features to mitigate risks.

7. Employee Training

Equip your staff with the knowledge and skills needed to uphold data privacy and security. Regular training ensures that everyone understands the significance of protecting member data. Cybersecurity professionals should engage in annual education through trusted industry organizations, while non-cybersecurity staff should be well-versed in key cybersecurity practices.

8. Data Retention Policies

Develop clear data retention and deletion policies. Holding member data only for the necessary duration and securely deleting it when it’s no longer needed minimizes the risk of data exposure.

9. Incident Response Plan

Preparedness is key in responding to data breaches. Develop a comprehensive incident response plan outlining communication strategies, technical actions, and legal considerations. A well-structured plan helps mitigate the impact of breaches.

10. Third-Party Vendors

If third-party vendors manage member data, ensure their security practices align with your standards. Conduct thorough due diligence before selecting any vendor to safeguard your members’ information.

11. Two-Factor Authentication (2FA)

Implement two-factor authentication to enhance security. This extra layer of protection, beyond passwords, helps prevent unauthorized access to member data and sensitive systems.

12. Regular Updates and Patching

Frequently update all software, including operating systems, applications, and security tools, with the latest patches and updates to address vulnerabilities promptly.

13. Data Segmentation

Not all staff members require access to all data. Segregate member data based on sensitivity to limit exposure in case of a breach.

14. Secure Communication

Utilize secure communication channels, such as encrypted email services, when exchanging sensitive information with members, enhancing privacy.

15. Privacy Impact Assessments (PIAs)

Conduct Privacy Impact Assessments to identify and mitigate potential privacy risks associated with your data handling practices, ensuring compliance with regulations and industry standards.

Frameworks and Standards

Consider adopting frameworks and standards such as ISO/IEC 27001, NIST Cybersecurity Framework, GDPR Guidelines, CIS Controls, and SEC Rules (2023) for cybersecurity disclosure. These frameworks provide valuable guidelines to enhance your organization’s cybersecurity posture.

Continual Vigilance

Remember, security is an ongoing process. Regularly review and update your practices to stay resilient against evolving threats and technologies. Seeking advice from cybersecurity professionals or consultants can offer valuable insights tailored to your non-profit’s specific needs.

By embracing these security and privacy best practices and adhering to relevant frameworks, non-profit organizations can uphold their commitment to their members’ data protection while fostering trust and confidence in their operations.

This content was originally posted on Medium.

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
8225
Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard https://wylieblanchard.com/certified-information-systems-security-professional-cissp-was-issued-by-isc2-to-wylie-blanchard/ Thu, 27 Apr 2023 17:50:18 +0000 https://www.wylieblanchard.com/?p=7988 View my verified achievement from ISC2. Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard on April 27, 2023. The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from ISC2.

Certified Information Systems Security Professional (CISSP) was issued by ISC2 to Wylie Blanchard on April 27, 2023.

The vendor-neutral CISSP credential confirms technical knowledge and experience to design, engineer, implement, and manage the overall security posture of an organization. Required by the world’s most security-conscious organizations, CISSP is the gold-standard information security certification that assures information security leaders possess the breadth and depth of knowledge to establish holistic security programs that protect against threats in an increasingly complex cyber world.

Learn more.

Skills:

Access Management, Asset Security, Communications Security, Identity Management, Network Security, Risk Management, Security Assessment, Security Engineering, Security Management, Security Operations, Security Testing, and Software Development Security.

Earning Criteria:

  • Obtain the required experience.
  • Achieve a passing score on the CISSP exam.
  • Obtain an endorsement from an existing ISC2 member.
  • Subscribe to the Code of Ethics.
  • Complete continuing professional education requirements.

Evidence:

Certification Number
1469327

Certified InformationSystems Security Professional (CISSP) by (ISC)²

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7988
Certified in Cybersecurity was issued by ISC2 to Wylie Blanchard https://wylieblanchard.com/certified-in-cybersecurity-was-issued-by-isc2-to-wylie-blanchard/ Sun, 12 Feb 2023 17:59:00 +0000 https://www.wylieblanchard.com/?p=7612 View my verified achievement from ISC2. Certified in Cybersecurity (CC) was issued by ISC2 to Wylie Blanchard on February 11, 2023. The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls […]

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
View my verified achievement from ISC2.

Certified in Cybersecurity (CC) was issued by ISC2 to Wylie Blanchard on February 11, 2023.

The vendor-neutral CC credential starts newcomers on their path to advanced cybersecurity certifications and future leadership roles. It proves to organizations that newly certified team members understand fundamental security principles and operations, network security and access controls and that they have the skills to meet and exceed performance standards in their beginning roles. All this allows organizations to build a stronger line of defense.

Learn more.

Skills:

Access Controls Concepts, Business Continuity (BC) Concepts, Disaster Recovery (DR) Concepts, Incident Response Concepts, Network Security, Security Operations, and Security Principles.

Earning Criteria:

  • Achieve a passing score on the CC exam.
  • Subscribe to the Code of Ethics.
  • Complete continuing professional education requirements.

Evidence:

Certification Number
1469327

Certified in Cybersecurity (CC) by (ISC)²

Get more great content at WylieBlanchard.com... Need a great speaker for your next event, contact us to book Wylie Blanchard now.
Learn what clients are saying about his programs....

]]>
7612