CYBER SECURITY BLOG

  • August 24, 2020

    Nearly every organization these days functions online. They meet online. They manage projects online. They communicate online — often through third-party services, often independently, and often via email.


    Email is a prevalent access point for security threats. 


    Learn More...

  • August 17, 2020

    Not to be a buzz-kill, but more freedom introduces more risk, inviting threats to exploit and abuse access to sensitive data. Every touchpoint within a network of access points provides the possibility of gaining entry and exposure to critical data that affects the safety of internal and external stakeholders.


    Protecting those access points is crucial, and controlling how people interact with and within networks is key to what's known as endpoint security.


    Learn More...

  • August 10, 2020

    These laws are similar, but they're not the same. The most glaring difference may be country of origin, but their verbiage differs in crucial areas.


    The short answer is that taking reasonable precautions to ensure you're acting according to the requirements set forth in the European Union's General Data Protection Regulation (GDPR) is not enough to qualify as compliant with the California Consumer Privacy Act of 2018 (CCPA).


    Learn More...

  • August 3, 2020

    Some American propaganda in World War II succinctly defines the cybersecurity case for data loss prevention services and software. Moreso as a metaphor, but its point remains.


    When the War Advertising Council developed the slogan "Loose Lips Sink Ships," sure, it was to be found on bar posters to frighten and contain rumors and information, but it also served to thwart inside threats and keep the country's knowledge and activity secure.


    Learn More...

  • July 27, 2020

    Personal privacy, and businesses' access to it, is being seen more and more as a basic human right in the digital era. Both CCPA and GDPR are four-letter acronyms that protect it.


    The California Consumer Privacy Act (CCPA) and General Data Protection Regulation (GDPR) are pieces of legislation that focus on privacy being a human right, given that personal information is increasingly being monetized in an economy powered by demographic and psychographic data points.


    Learn more...

  • July 20, 2020

    The CCPA is geared toward protecting consumer privacy, including the right to access any personal information the business has collected on the consumer in the prior 12 months, the right to delete any personal information about the consumer collected by the business, the right to know that a business will even collect personal information, and the right to request that personal information not be sold. The question is "Who does it affect?"


    Learn More...

  • July 13, 2020

    The benefits of managed security services start with a new perspective, which can present a better way to do things or fulfill needs that were previously unmet. What more can you ask for? Well, quite a bit, which is why we've outlined a high-level overview of some of the primary benefits you may receive from a managed security services provider.


    Learn More...

  • July 6, 2020

    Managed security service providers are a more specialized managed service provider that function as a cyber security resource, overseeing the functions, devices, and monitoring related to information technology security.


    Learn More...

  • June 29, 2020

    Network vulnerability assessments are a means of protecting an organization from cyber security threats. These routine assessments will identify potential weaknesses in network security throughout an organization.


    Learn More...

  • June 22, 2020

    Risk exists everywhere. It's just a fact of life. It's in project management, investment, budgets, legal liability, inventory, supply chains, and, yes, cybersecurity. The damage to information systems, both innovative and legacy, can come from a variety of factors — like purposeful attacks, environmental disruptions, and human error, to name a few.


    Learn More...

  • June 15, 2020

    Like a door to a home, an endpoint is any device used to enter a network. It is the point of entry to access sensitive, restricted, or otherwise valuable data. An endpoint is a device like a phone, laptop, or tablet. There are other types of endpoints, depending on who you ask, but for the sake of simplicity, we'll keep it to just remote devices.


    Learn More...

  • June 8, 2020

    Cloud security is the protection of data, infrastructure, and systems operated in cloud computing environments. The issues it can handle include data protection, network security, virtualization security, application integrity, and identity management.


    Learn More...