We often get questions asking us about MSP vs. MSSP. MSPs and MSSPs are frequently confused, but...
Category: Security
A SOC 2 Type 2 Compliant and NIST CSF Knowledgeable IT MSP Offers Peace of Mind
Businesses often invest in outsourcing tasks that could leave their data vulnerable in a...
Risky Business: Defining 3rd Party Vendor Risk
Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Here’s the catch: “risk” is a pretty broad umbrella term, with no two vendors or regulators defining risk in the same way. To effectively create assessments for third-party vendors, let’s break “risk” down.
Managing GDPR with CISO: and Other Cybersecurity Acronyms
The most influential component of a successful cyber security program to ensure your business maintains regulatory compliance for EU GDPA, NYDFS and HIPAA are effective policies and procedures designed for your business. With our CISOaaS solution, you can rest assured that your cybersecurity situation not only meets, but exceeds expectations.
The Password is Dead: Introducing MFA
In a world of remote access, it’s the single barrier we have between bad passwords and hackers. Find out why you need multi-factor authentication for your personal and business accounts.
Helping Houston in Harvey’s Wake
Avoid charity scams by giving to established local organizations to help Houston after Hurricane Harvey.
Petya: Latest Global Ransomware Attack
Petya: There is a vaccine, but no kill switch.
What Is Ethical Hacking?
Can your employees spot a “phishy” email? How do you build the human firewall? There’s a fine balance you need to establish with your users between basic awareness and productivity.
Developing the Entire Workforce
Have you watched this yet? It is important, after all, in our social media world of TED Talks and fake news, to not take everything we hear or see at face value.