Blog
Insights for Reasonable Cyber Security and Compliance
What’s happening in the world of cybersecurity? How do you define 'reasonable' security controls? Which cyber threats can be prevented? What steps should you take to make your systems safer? Read our blog posts to gain new insights into cybersecurity news, security awareness, the latest threats and risks, penetration testing, compliance, regulations and so much more.
Recent Changes and Amendments to Cybersecurity Compliance Acts in California, Colorado, and New York
As we have outlined in prior articles, states such as California, Colorado, and New York are actively implementing regulations that will enforce compliance regulations concerning the management of personal information with reasonable security. Like cybersecurity itself, legislation is a dynamic process and states continue to tweak and add amendments to the existing laws. (more…)
Insufficient Vendor Reviews = Rampant Third-Party Breaches
According to a survey conducted by the Ponemon Institute in 2018, 59 percent of companies have experienced a third-party breach of some type. Despite the high prevalence of these incidents however, only 16 percent say they effectively mitigate third-party risks. (more…)
Why Breaches of Web-Facing Assets are on the Increase
Think of a hacker as an enemy attack submarine. In warfare, a submarine lurks underwater, seeking victims. It may be probing the defenses of a shipping harbor to find weaknesses that can be exploited. Hackers perform a similar strategy today as they probe the web for internet-facing assets to find easy targets to breach and exploit. (more…)
Best of Breed: Bulldogs
Be cyber security awareness champion like the English and French bulldogs! If you follow these cyber security tips, Bully for You!
(more…)It’s Time to Get Serious About Phone Number Spoofing
Spoofing is a common threat in the cyber security world. (more…)
Chris Cronin at EXPO.health Conference
The 2019 EXPO.health conference is focused on 5 main topic areas which are of interest to health IT professionals at hospitals, health systems, and ambulatory organizations (more…)
Cyber Security: How to Secure Your Devices and Data Webinar
We invite you and your team to the upcoming Institute of Real Estate Management (IREM) live cyber security webinar. (more…)
Best of Breed: Cyber Awareness Champions
Download your favorite champion breed to promote cyber security awareness.
How is PCI DSS Enforced?
Unlike most regulations you may be familiar with, the PCI DSS is enforced by contract – here is a quick look at the process; learn more about how you can achieve PCI compliance. Download your reference sheet.