Encryption
At least 46 states including early pioneer California (SB 1386) have security breach notification laws that legislate cybersecurity and discourage mishandling of unencrypted, personally identifiable information on computer networks.
Access Control
Access control is a process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
Test
Sophisticated intruders can bypass perimeter defenses to perpetrate attacks that are highly targeted and difficult to detect. Continually updating and assessing the adequacy of a firm’s cybersecurity posture is imperative.