If you're running an IT department at a small to mid-size company, you know— the demands on your...
Posts written by Nick McCourt, vCISO at Integris
Preparing Your IT Team to work with a vCISO: a Step-by-Step Guide
According to recent reporting from Channel Futures, the market offering for virtual Chief...
When Do We Need a vCISO?
According to recent reports from CIO magazine, cybersecurity is still the number one concern in...
Social Engineering Hacks—Are They a Bigger Threat than Ransomware in 2023?
Are social engineering hacks a bigger threat than ransomware? Learn more about current threats, and take action to protect your business.
The Five Ways Companies Fail at Their Vulnerability Management Program
I get it. Running a vulnerability management program is a complicated task for any company. In my...
Microsoft Defender: New Threat Hunting Services
According to its announcement last year, Microsoft is going in big on cybersecurity, to the tune...
Cybersecurity: The Operating Expense that Makes You Money
Honestly, it can get a bit overwhelming for all those businesses out there, being asked to pony up for yet another “must-have” cybersecurity tool. I get it. But, as you’re getting out the corporate credit card for your next cybersecurity upgrade, I’d urge you to stop thinking of that spend as just another overhead expense. Instead, why not flip that assumption upside down? Have you considered all the ways that your cybersecurity program might actually be making you money?
The Futility of Firewalls
Yes, a firewall is essential. But if that’s all you want, you’ll miss all the other mechanisms that make your program go, just like “blue” can’t drive your car.
On Coffeemakers, Quick Start Guides, and Why the Missing Piece in Your Vulnerability Scan Is Your MSP
In this complicated world, a quick start guide can make all the difference. So why then, are so many cybersecurity companies missing the opportunity to use that “quick start guide” mentality to create reports a company can actually act upon? If you have a vulnerability scanning and reporting program, you owe it to yourself to have an MSP that owns the program, can analyze the reams and reams of information that come in from it, and issue some doable suggestions for correcting your vulnerabilities. But before we get into all that, let’s first talk about what a vulnerability scan can do for your organization.