Blog

Filter

CTOCyber Security AwarenessCybersecurityFood for thoughtFoundationalInformation SecurityInfosecSME

Five Easy Things to Do Now to Protect Your Small Business against Russian Cybercrime (or Any Other Malicious Hacker)

March 30, 2022
You can significantly reduce your cyber risk efficiently and expeditiously. The strategies to defend yourself against Russian hostility are the same strategies we urge any small- to medium-sized business to…
CybersecurityInformation SecurityInfosecPenetration TestingPentesting

This Information Security Test Finds Vulnerabilities Before Threat Actors Can

February 4, 2022
In a threat landscape where ransomware attacks double year-over-year and the number of data compromises is at an all-time high, it is vital to understand how your information security program will…
ComplianceCTOCybersecurityInformation SecurityInfosec

Three Ways Passing a Compliance Audit is Different Than Running a Security Program

January 24, 2022
“I hate being audited. I love having been audited.” As your organization’s information security leader, you will likely need to go through an audit to prove your organization is compliant…
ComplianceCTOCybersecurityInformation SecurityInfosec

Cybersecurity Compliance Isn’t Enough. Here’s Why.

January 11, 2022
The landscape of business changed forever with the introduction of the Internet in the early 1990s. The opportunities that digital technology and the World Wide Web introduced to business leaders fostered the…
CTOCybersecurityInformation SecurityInfosecSME

Simplify Your Information Security Program by Taking a Closer Look at Your Organization

December 23, 2021
It’s no surprise that security ranked as the top cloud challenge for technical professionals representing organizations of all sizes in this 2020 Q4 survey. The abundance of solutions and strategies trying to get…
CTOCyber Security AwarenessCybersecurityInformation SecurityInfosec

Your Data Classification and Handling Policies: What You Need to Know

December 9, 2021
Data is a valuable asset in modern business, and your security program is there to protect it and ensure your assets remain safe. Data can take the form of files,…