Category: Security

Risky Business: Defining 3rd Party Vendor Risk

Risky Business: Defining 3rd Party Vendor Risk

Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Here’s the catch: “risk” is a pretty broad umbrella term, with no two vendors or regulators defining risk in the same way. To effectively create assessments for third-party vendors, let’s break “risk” down.

Managing GDPR with CISO: and Other Cybersecurity Acronyms

Managing GDPR with CISO: and Other Cybersecurity Acronyms

The most influential component of a successful cyber security program to ensure your business maintains regulatory compliance for EU GDPA, NYDFS and HIPAA are effective policies and procedures designed for your business. With our CISOaaS solution, you can rest assured that your cybersecurity situation not only meets, but exceeds expectations.

The Password is Dead: Introducing MFA

The Password is Dead: Introducing MFA

In a world of remote access, it’s the single barrier we have between bad passwords and hackers. Find out why you need multi-factor authentication for your personal and business accounts.

What Is Ethical Hacking?

What Is Ethical Hacking?

Can your employees spot a “phishy” email? How do you build the human firewall? There’s a fine balance you need to establish with your users between basic awareness and productivity.

Developing the Entire Workforce

Developing the Entire Workforce

Have you watched this yet? It is important, after all, in our social media world of TED Talks and fake news, to not take everything we hear or see at face value.