15 Steps to Security under CCPA

Follow these steps to “reasonable security” as required by the California Consumer Privacy Act.

CCPA 15 steps thumbnail

Be ready when the deadline comes - get started now!

What you'll learn:

First things first

Start with your data, what you need to protect —and what you don’t

Policies and practices

More than having the right technology, what’s important is how you apply it

People pointers

Your human assets are critical to a successful defense

Beyond technology

Critical but often-overlooked security measures

Get your step-by-step guide to reasonable security

For over 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003. For more information, visit www.eset.com or follow us on LinkedIn, Facebook and Twitter.

© 2008-2019 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. All other names and brands are registered trademarks of their respective companies.