The CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap for their cybersecurity defense. Piecemeal or fragmented defense strategies, in response to the latest cyberthreat,
6 Steps to Create a Program to Meet CCPA & GDPR Compliance Requirements
A 6-Step Guide to Creating a Privacy and Compliance Program CCPA, GDPR and the coming second wave of new, stricter co mpliance regulations being put in place globally is resulting in higher
Stopping Coronavirus Cyber-Scams Before They Start – Part 2
How to Identify Coronavirus Cyber-Attacks – Part 2 In our first post concerning Corona Virus cyber-scams named “How to Identify Corona Virus Cyber-Attacks,” we wanted to warn our customers and readers
4 Key Steps to Stopping Ransomware Attacks
How Significant is the Ransomware Problem? In writing this blog post we reviewed data from a variety of surveys including the Verizon Data Breach Report, the Cybersecurity Insiders Survey, the Ponemon
6 Steps to Processing DSAR’s Under CCPA & GDPR
A Framework to Processing DSAR’s Under CCPA & GDPR We continue to dig into the topic of privacy, GDPR, and CCPA in this blog to clarify the requirements of current compliance
Securing Your Remote Workforce
Protecting Your Remote Employees from Cyber Attacks As we suggested in our last blog post, this blog post was written to help our customers and readers of our blog protect themselves
Stopping Corona Virus Cyber-Scams Before They Start
How to Identify Corona Virus Cyber-Attacks This blog post was written to help our customers and readers of our blog identify scams that were created by cybercriminals to leverage the Corona
Executing DSAR’s Under CCPA & GDPR
Better Solutions to Handling DSAR’s Under CCPA & GDPR We’ve written about privacy, GDPR, and CCPA several times in this blog in order to clarify the requirements of current compliance legislation
Phishing and Wire Transfer Scams are Victimizing Corporate Executives
“CEO Fraud” or “CEO Fraud Phishing” Doubled Over the Past Year CEO Fraud is a scam in which cyber criminals either spoof or literally take over company email accounts to impersonate
Ransomware is Targeting Industrial Control Systems
Industrial Control System (ICS) Ransomware is Evolving…Quickly Several months ago we wrote a blog post called The Evolution of Malware which tracked the development of how cyber-attacks and malicious code have