New Year’s Resolutions for 2012
It’s that time of year again! Yay! (more…)
We’re getting more and more demand for Cyber Security Risk Assessments these days. What are they and what’s involved? (more…)
Continuing on with the employee security awareness thought: the weakest link – the WSJ article discusses other areas. (more…)
Another great article by WSJ – this one on information security and employee cyber security awareness. Because hackers today are so advanced, applying all the security solutions at our disposal and shoring up the perimeter isn’t enough anymore. (more…)
Systems and Architecture Review. So, you’re feeling pretty confident that you’ve got your environment locked down. Are you certain your infrastructure, servers, and devices deployed throughout your organization are protecting the confidentiality, integrity, and availability of your sensitive information assets? (more…)
Who is safeguarding your customers’ sensitive data? I’ve been reading with wonder, as I’m sure many of you have, about the seemingly endless parade of breaches for companies small & large. Increasingly, it isn’t the company reporting the breach that is the cause of the issue; rather it has been partners or service providers to those companies. (more…)
As we welcome in the New Year, it’s common for people to make a few New Year’s Resolutions. Let’s make a few New Year’s Information Security Resolutions! This year I challenge you to resolve to do the following: (more…)
Data Classification – Determining what constitutes “sensitive data” is usually not a difficult thing for most people. For me personally, it would be my social security #, my account information – banking, credit card information. And, sadly as the years go by, my birthdate is getting to be more sensitive… (more…)
Welcome for another blog post in our cyber security best practices series. (more…)