metarouter

    4 min read

    Thinking About Building An In-house Data Integration Solution?

    By Preston Ketchum on 6/10/20 1:23 PM

    Think about NASA.
    Topics: Flexibility Security Compliance Technology Data Security GDPR
    6 min read

    Three Ways to Gain Consumer Trust

    By Karen Martin on 2/11/20 1:05 PM

    With e-comm accounting for 13.7% of global retail sales in 2019that’s 3.453 trillion dollars—and rising, companies who step back to embrace the challenges head on will find golden opportunities to keep data safe will be the ones who not only avoid penalties and expensive data breaches, but also increase consumer trust.

    Topics: Security Compliance Data Security
    5 min read

    The Ethics of Collecting Consumer Data

    By Karen Martin on 1/28/20 5:44 AM

    Discussions of business use of consumer data often focus on legal issues, like risks and regulations. For good reason: the massive amount of personal information collected by governments and businesses can cause potential harm and huge fines if misused. So much so that newer privacy regulations like the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) limit uses of data and seek to give power back to the consumer.

    Topics: Security Compliance Data Security
    4 min read

    Navigating New Regulations for Children's Apps

    By Yetunde Abass on 1/22/20 10:17 AM

    The year 2019 was a time of reckoning for the industry of children's apps. In February, ByteDance, the parent company of TikTok, was hit with a $5.7 million fine from the Federal Trade Commission (FTC) for illegally collecting names, email addresses, pictures, and the geographic locations of children under 13 in violation of the Children’s Online Privacy Protection Act (COPPA).

    Topics: Security Compliance Data Security
    6 min read

    Server-Side Streaming for the Security Conscious

    By Kayly Lange on 8/12/19 8:25 AM

    In the late 90s, businesses became aware that they could track their customers’ data with JavaScript tags. The revolution of data tracking began. As the Internet grew, companies could get better insight into their users’ preferences and shopping habits. They can now understand their customers better than ever. They can even figure out when their customers are pregnant—before their own families.

    Topics: Security data infrastructure reliability server-side
    7 min read

    Taking a Closer Look at the Data: PII

    By Yetunde Abass on 8/1/19 10:48 AM

    With every week there seems to be another story about a data breach or a company being held accountable for a previous one. States and jurisdictions are racing to put laws on the books to protect consumer privacy and/or mitigate damage of data exposure.

    But what data are these laws protecting?

    Topics: Security Compliance personal data pii data data regulation
    5 min read

    Three Major Players Moving Away from Client-Side Tags

    By Kayly Lange on 7/22/19 9:56 AM

    Since the late 90s, if a company wanted to know more about their virtual users, tags were the way to go. However, that’s all starting to change.

    Client-side tags are falling out of favor in a significant way. With the rise of smartphones, legislation over data, and the emphasis on customer experience, tags can’t keep up with modern e-commerce. Instead, companies are starting to lean on server-side data to get the information that they need.

    Topics: Security page optimizations tag governance server-side Page Optimization
    8 min read

    Security Primer for Startups and Small Businesses

    By Kailyn Lepert on 4/11/19 9:03 AM

    With issues around security and compliance being launched to the forefront of businesses' minds, our team decided it was time to not only evaluate our practice, but also the process around the practice. Thankfully one of our all-star engineers, Kailyn, has an extensive background in the study.

    Pulling from her experience working with teams small and large on high-profile financial data security projects among others, she lays out how to take this process from the back to the driver's seat. Organizations of all sizes have the imperative to shore up their systems, but it does not need to be mysterious or agonizing...read on!

    Topics: Security risk management basics
    8 min read

    Intruder Alert! Top Five Data Breaches this Decade

    By Becky Steele on 3/4/19 1:00 PM

    Data breaches seem to be on the rise in number and scope over the past decade, and it is increasingly likely that you have or someone you know has been affected by one. Being particularly invested in the future of the data-scape, our team was curious to go back and reflect on some of the high profile leaks that have pervaded the 2010s. Following is our roundup of five of the most impactful data catastrophes we researched, with a nice metric system to categorize our choices.

    Topics: Security data breaches personal data
    11 min read

    Translating Real-World Randomness To Create Digital Security

    By Andrew Murray on 2/21/19 9:00 AM

    Or, how I used a deck of cards to protect my data.

    Every year, our data becomes more accessible as the world is increasingly interconnected and more services we depend on become available online. This allows for ease that was unimaginable just twenty years ago. You can bank, apply for a mortgage and credit cards, share personal photos, store important documents and get a real-time view into your home at any time.

    Topics: Security personal data