GLBA FOR MORE INFORMATION
Additional guidance is available at www.ftc.gov/privacy/glbact. Resources at that site may alert you to new risks to information security and give people whose information may have been compromised important first-things-first advice for responding. Visit www.onguardonline.gov for information that can help you train your employees in safe computing practices on the job and at home. In addition, the following organizations have information to help you implement appropriate safeguards for your customer data:
Computer Security Resource CenterNational Institute for Standards and Technology (NIST) http://csrc.nist.gov
National Strategy to Secure Cyberspace, Department of Homeland Security http://www.dhs.gov/files/publications/editorial_0329.shtm
The SysAdmin, Audit, Network, Security (SANS) InstituteThe Twenty Most Critical Internet Security Vulnerabilities www.sans.org/top20(link is external)
United States Computer Emergency Readiness Team (US CERT)
Carnegie Mellon Software Engineering Institute CERT Coordination Center www.cert.org(link is external)
Trojan Horse Security | Cyber Security | Penetration Testing | Security Audits www.TrojanHorseSecurity.com
The FTC works for the consumer to prevent fraudulent, deceptive, and unfair business practices in the marketplace and to provide information to help consumers spot, stop, and avoid them. To file a complaint or to get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
Trojan Horse Security offers comprehensive IT security solutions across all aspects of GLBA compliance including; assessing, planning, implementing, monitoring, reporting and maintaining compliance.
Our solutions for GLBA compliance are based on the lastest GLBA standards and years of proven experience. They integrate comprehensive processes that are designed to encompass every aspect of security planning, management, and compliance reporting.
Contact a specialist now to learn how Trojan Horse Security can help you become GLBA IT Compliant.