IT Security
picture of major regulations acronyms

The importance of regulations

cyber security and regulatory complanceIf your business is upon those covered by regulatory laws, you may think of them as a painful requirement. Not to mention expensive, when you consider the cost of hiring staff to meet such requirements. However, consider how difficult it would be if each company needed to come up with a robust system of protecting their valuable information. Think of it like the instruction manual for a complicated Ikea cabinet, without it the job would be much more difficult. Regulations recommend appropriate standards which organizations can use to maintain effective cyber security programs. They also facilitate the development of robust strategies for securing data and information systems. As old threats evolve and new threats emerge, these regulations change. Updating your infrastructure to meet those changes helps keep you protected.

Benefits of compliance

Avoiding penalties: The biggest one that might come to mind with any business owner is the penalties of non-compliance.
Reduced risks: Regulations recommend best practices for reducing cyber risks. This helps keep your business identity from gaining a bad reputation.

Cyber security and compliance regulations

Compliance with regulations is crucial in maintaining working cyber security policies. However, organizations tend to focus more on the regulations in terms of time and resources at the expense of developing effective cyber security procedures. As such, they might be more exposed to cyber threats. Besides, criminals have access to the regulations, and they can innovate means of compromising the standards. To counter this, businesses should combine security tools and processes with existing regulations. For instance, artificial intelligence can effectively detect and respond to threats, and at the same time, keep tabs on current and emerging compliances. This can play a large role when selecting certain security software, like an anti-virus. An active Endpoint detection and response (EDR) solution will go much further than a traditional anti-virus that’s based on a database of known threats.

The future of cyber security

New technologies will redefine the cyber security landscape. To mention just a few, 5G networks will lead to faster speeds used to interconnect smart cities, critical infrastructures, and billions of IoT devices. Cyber-attacks will focus on disrupting or taking control of critical systems. And, improperly configured IoT devices pose a large risk factor to any network.

Also, artificial intelligence will lead to smarter and more sophisticated attacks. Hackers will develop intelligent malware capable of executing where there will be the most severe damage. On the other hand, security experts will include artificial intelligence in security products that can detect attempted intrusions and deploy appropriate responses with minimal human intervention.

Biometric security, such as fingerprints and iris scanning is currently used to authenticate users before allowing them to access items such as smartphones, computers, and buildings. Due to the need for enhanced security, future biometrics will include details like walking styles and body movements.

Current compliance laws

The following is a short list of some of the compliance laws, though not all are listed here. When studying these and other regulatory laws, you’ll find that they all have different requirements, however, they all revolve around 3 things when it comes to data security.

  1. Confidentiality – Ensuring the information is not disclosed to unauthorized sources.
  2. Integrity – This ensures the protection of the information from being modified by unauthorized persons or the destruction of said data.
  3. Availability – This last one ensures reliable access to data and services for authorized users in a timely fashion.


HIPAA (Health Insurance Portability and Accountability Act) contains requirements which organizations use to secure health data belonging to employees or patients. The requirements enable an institution to adopt the best data protection practices.


Gramm-Leach-Bliley Act (GLBA) is intended for the financial sector, this regulatory law, among other things, is set to protect financial information. This protection is on behalf of the consumers and applies to organizations engaged in financial activities. This includes, but is not limited to, banks, and companies dealing with mortgages, insurance, tax preparation, debt collection and more.


The primary purpose of FISMA (Federal Information Systems Management Act) is to set security standards which federal agencies should follow when developing cyber security programs. The standards can assist private entities in bolstering their cyber defense efforts.


Sarbanes-Oxley Act (SOX) dramatically changed how public companies do business. It was established to restore public confidence in the financial reporting of public companies. It requires independent auditing and enhanced financial disclosures among other things.


PCI-DSS (Payment Card Industry Data Security Standard) provides security standards for securing credit card data and points of sale within an organization. This is to prevent attacks aimed at compromising online transactions such as those done in eCommerce platforms.


GDPR (General Data Protection Regulation) recommends guidelines for securing personally identifiable information belonging to European Union citizens. The guidelines include data encryption and requiring data owner consent before using it.


Josue Nolasco

I'm a former US Marine infantryman who made a switch to IT to provide cyber security services to SMB's. I'm as much a child of technology as I am of the great outdoors. I like spending time playing, experimenting with, and learning new technologies and whenever possible taking camping trips with friends and family.

toto togel TOGEL togel4d akitoto situstoto Akitoto situstoto Situstoto TOGEL situs toto togel situstoto toto togel