A businesswoman in a suit and sunglasses walks confidently with a briefcase, followed by faded shadow versions of herself鈥攊llustrating the concept of an "IT Shadow" and unseen or duplicative activity in the business world.

Do You Have A Shadow IT Problem? Here’s Why You Need A Plan

Even when there is no malicious intent, unsanctioned applications can cause major problems for your agency By Bryan Johnson, IT Director, 海角吃瓜黑料mpany Have you heard of shadow IT? The term conjures images of masked criminals poking around on your server or installing dangerous devices. Yet shadow IT is usually more mundane, referring to applications installed without …

Documents labeled 'Geographic Targeting Orders' and 'FinCEN Final Real Estate Report Rule' surrounded by floating music notes and sheet music, suggesting a creative or lighthearted take on a regulatory topic

Ready or Not: Preparing for the FinCEN Final Rule

By Elyce Schweitzer, Esq., Regulatory Compliance Officer, 海角吃瓜黑料; andValerie J. Grandin, Esq., Sr. Underwriting Counsel Florida and Vice President, 海角吃瓜黑料 Here鈥檚 a riddle for the title insurance and real estate industries: what does Dolly Parton鈥檚 song, 鈥淗ere You Come Again鈥 have to do with FinCEN, its Geographic Targeting Orders (GTOs), and its Final Real Estate Report Rule (Final …

Vendor Security: The Weakest Link?

Vendors carry unique risks; here鈥檚 how to address them Remember the TV show The Weakest Link? Running from 2000 to 2012, the show enjoyed quite a bit of popularity back in the day. Host Anne Robinson鈥檚 catchphrase 鈥淵ou are the weakest link-goodbye!鈥 even became part of the cultural lexicon for a moment in time. A business鈥檚 cybersecurity strategy will inevitably have …