Navigating Security and Compliance Frameworks

Overview From the inception of technology, security concerns have always been at the forefront. Information security preserves an organization’s reputation, maintains business continuity, and prevents financial losses. In today’s evolving cyber landscape and global economy, securing a competitive advantage and demonstrating a commitment to information technology security has become more critical than ever before. Audit […]

Top 10 Things to Look for in a Pen Testing Vendor

Many organizations are required by law to adhere to regulations or industry standards (for example, NIST, CMMC, PCI DSS, GLBA, HIPAA, SOC 2, ISO 27001, etc.) that include the use of security assessment techniques like penetration testing (aka, “pen testing”) as a component. Other organizations want to be proactive and find the “open doors and […]

Getting Ready for the FTC Safeguards Rule

A Company can never be too safe in making sure that its systems are protected from cyberattacks. Responsibility of information security does not only lie with your Information Security Group but also at the highest levels within a company.  Based on a recent ruling by the FTC, CEOs are now responsible for their company’s compliance, […]

Cybersecurity Month is over! What do I focus on next?

The answer is simple!  ‘Focus on Cybersecurity not only during Cybersecurity Month but EVERY month.’ Cyberattacks are much more common than people realize. The data on the frequency of attempted cyberattacks is staggering, with a victim every few seconds and several thousand ransomware attacks targeting businesses daily. Some of these attacks are random, but many  […]

It’s Time to Do More to Secure Your Email

According to the 2021 Verizon Data Breach Investigations Report, more than 85% of breaches during the assessed period involved a human element[1]. Additionally, social engineering (typically via phishing emails) ranked a close third as the primary vector for damage, behind denial of service (DoS) and web application attack vectors. Attackers are increasingly turning to phishing […]