Security Leaders Grapple with Understanding Their Own Cybersecurity Risk – Part 1
Risk Management Comes Back into Focus Less than 50% of IT Security leaders are able to...
Continue ReadingWhy MAZE Ransomware Attacks are So Devastating
Why MAZE Ransomware Attacks are So Devastating MAZE ransomware is quickly becoming one of the most...
Continue ReadingThe 5 Elements to Effectively Managing HIPAA Compliance
Managing Patient Data (PHI) Sprawl In 1996, the Health Insurance Portability and Accountability Act (HIPAA) created...
Continue ReadingThe CIS 20 Foundational – Beyond the Basics
Beyond the Basics — CIS 20 Part Two – Controls 7-16 All organizations need a roadmap...
Continue Reading6 Steps to Create a Program to Meet CCPA & GDPR Compliance Requirements
A 6-Step Guide to Creating a Privacy and Compliance Program CCPA, GDPR and the coming second...
Continue ReadingHow Companies Use CIS 20 to Secure Remote Workers
Using CIS Controls 1-6 to Secure Your Remote Employees As we in the industry have documented...
Continue Reading5 Steps to Uncovering Malware on Your Network
How to Detect Malware and through Anomalous Behavior on the Network According to a recent Symantec...
Continue Reading4 Key Steps to Stopping Ransomware Attacks
How Significant is the Ransomware Problem? In writing this blog post we reviewed data from a...
Continue ReadingSecuring Your Remote Workforce
Protecting Your Remote Employees from Cyber Attacks As we suggested in our last blog post, this...
Continue ReadingExecuting DSAR’s Under CCPA & GDPR
Better Solutions to Handling DSAR’s Under CCPA & GDPR We’ve written about privacy, GDPR, and CCPA...
Continue Reading