How to Prepare Your Organization for an ISO 27001 Security Audit
Preparing for An ISO 27001 Internal Security Audit By Jordan MacAvoy ISO 27001 is the only standard that sets out the specifications for an information security management system (ISMS). Achieving ISO 27001
How to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of months before the outbreak of the Coronavirus pandemic we wrote about our concern with regard
Why MAZE Ransomware Attacks are So Devastating
Why MAZE Ransomware Attacks are So Devastating MAZE ransomware is quickly becoming one of the most devastating strains of Windows ransomware that have infiltrated companies and organizations around the world and
The 5 Elements to Effectively Managing HIPAA Compliance
Managing Patient Data (PHI) Sprawl In 1996, the Health Insurance Portability and Accountability Act (HIPAA) created an electronic data interchange that health-care providers and other related organizations are required to use
Over 90% of all Cyber-Attacks Involve Phishing – Tips to Stop Phishing Attacks
Phishing Accounts for Over 90% of Cyber-Attacks – Learn How to Stop Them Among the billions of e-mails transmitted each day around the world, a significant and growing portion consists of
The CIS 20 Organizational Controls – Controls 17-20 Explained
Controls 17-20 — CIS 20 Part Three – The “Organizational” Controls As we suggested in the first two blog posts of our CIS 20 blog post series, the first steps in
The CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap for their cybersecurity defense. Piecemeal or fragmented defense strategies, in response to the latest cyberthreat,
6 Steps to Create a Program to Meet CCPA & GDPR Compliance Requirements
A 6-Step Guide to Creating a Privacy and Compliance Program CCPA, GDPR and the coming second wave of new, stricter co mpliance regulations being put in place globally is resulting in higher
How Companies Use CIS 20 to Secure Remote Workers
Using CIS Controls 1-6 to Secure Your Remote Employees As we in the industry have documented consistently, Cyber-attacks continue to grow in sophistication and damage particularly over the past several months.
5 Steps to Uncovering Malware on Your Network
How to Detect Malware and through Anomalous Behavior on the Network According to a recent Symantec survey, 90% of CIOs believe they are wasting millions of dollars on insufficient cybersecurity, while