The REAL Benefits of a Managed Security Service Provider (MSSP)
The Advantages of Outsourcing Cybersecurity We’ve written blog posts on the “5 Benefits of an MSSP”...
Continue ReadingINTERPOL – Cybercrime Increasing at “Alarming Pace”
The State of Cybersecurity in 2020 This blog post is geared to provide a clear picture...
Continue ReadingFour Strategic Principles of Network Security Design
We recently looked at the CIS 20 – a list of 20 key controls that you...
Continue ReadingHow to Prepare Your Organization for an ISO 27001 Security Audit
Preparing for An ISO 27001 Internal Security Audit By Jordan MacAvoy ISO 27001 is the only...
Continue ReadingThe Twitter Cyber Scam – How Twitter Got Hacked
Twitter has suffered the most catastrophic attack in its history and one that directly affected many...
Continue ReadingBug Bounty Programs are Becoming Increasingly Effective
What is the Difference Between Bug Bounty and Vulnerability Management Programs? In this blog, SecureOps Senior...
Continue ReadingHow to Defend Against Magecart Skimming Cyber Attacks
Defending Against Magecart Skimming Cyber Attacks Prior to the holidays last year and a couple of...
Continue ReadingWhy MAZE Ransomware Attacks are So Devastating
Why MAZE Ransomware Attacks are So Devastating MAZE ransomware is quickly becoming one of the most...
Continue ReadingThe 5 Elements to Effectively Managing HIPAA Compliance
Managing Patient Data (PHI) Sprawl In 1996, the Health Insurance Portability and Accountability Act (HIPAA) created...
Continue ReadingOver 90% of all Cyber-Attacks Involve Phishing – Tips to Stop Phishing Attacks
Phishing Accounts for Over 90% of Cyber-Attacks – Learn How to Stop Them Among the billions...
Continue Reading