The Weak Link in the Chain: Managing Supply Chain Risk

Posted by John Price on Nov 7, 2019 10:10:06 AM
Read More

Topics: Supply Chain Risk Management, Vendor Risk Management, Risk Management

Why Local Governments are At Risk of Ransomware Attack

Posted by Melanie Klag on Oct 28, 2019 12:29:19 PM
Read More

Topics: "Cybersecurity", Cyber Attack, Ransomware

What is Cyber Incident Detection and Response?

Posted by Melanie Klag on Oct 23, 2019 11:48:33 AM
Read More

Topics: Compliance, SOC, Security Operations Center, SOCaaS, Incident Response, Cyber Attack

Why Your Organization Should Conduct a Physical Penetration Test

Posted by Melanie Klag on Oct 14, 2019 10:30:00 AM
Read More

Topics: "Pentesting", "Penetration Testing", Physical Penetration Test

The Importance of Web Application Penetration Testing

Posted by Melanie Klag on Oct 8, 2019 10:46:00 AM
Read More

Topics: "Pentesting", "Cybersecurity", "Penetration Testing", Application Security

The 5 Benefits of Security Operations as a Service

Posted by Melanie Klag on Oct 4, 2019 10:00:00 AM
Read More

Topics: SOC, Security Operations Center, security operations, SOCaaS

The Importance of Incident Detection and Response in Maintaining GDPR Compliance

Posted by Melanie Klag on Oct 1, 2019 10:39:48 AM

Incident detection and response is the process of finding attackers in your IT infrastructure, monitoring or determining their activity, containing the threat and removing attackers or any viruses from your systems. When the European Union enacted the General Data Protection Regulation, which protects the personal data of EU citizens regardless of the geographical location of the organization using the data, companies all over the globe had to ensure they were prepared for cyber-attacks. If companies were not compliant with the GDPR, then they could not do business with any citizens or businesses based in the EU. To be compliant, data must be protected. Therefore, being able to immediately and effectively respond to incidents or threats of a data breach became of utmost importance.

Read More

Topics: "Cybersecurity", Compliance, GDPR

How Penetration Testing Can Help Your Organization Direct Cybersecurity Spending

Posted by Melanie Klag on Sep 27, 2019 12:17:18 PM
Read More

Topics: "Pentesting", "Cybersecurity"

Why Penetration Testing is Vital to Your Cyber Defenses

Posted by Melanie Klag on Sep 20, 2019 12:14:00 PM
Read More

Topics: "Cybersecurity", "Penetration Testing"

5 Things Your Organization Should Do To Protect Against Ransomware

Posted by John Price on Jul 30, 2019 10:37:00 AM

Ransomware is exactly what it sounds like! It is a type of malicious software that, once installed, blocks access to a computer system until a sum of money is paid. All businesses and individuals are at risk to a ransomware invasion. It can be introduced into your systems simply through clicking on a link or opening an encrypted file. And once introduced, the malware has access to all of your data. Therefore, protecting against ransomware is necessary. Here’s where to start.

Read More

Topics: "Cybersecurity"