Welcome to the top 10 IT best practices to adopt right now. This simple, non-technical “listicle”...
Results for vCISO
The Five Ways Companies Fail at Their Vulnerability Management Program
I get it. Running a vulnerability management program is a complicated task for any company. In my...
Your IT Battle Card for the New FTC Safeguards Rule
The new FTC Safeguards Rule includes updated definitions of "financial institution" that go into...
The Futility of Firewalls
Yes, a firewall is essential. But if that’s all you want, you’ll miss all the other mechanisms that make your program go, just like “blue” can’t drive your car.
The Rise of CISO Service at Integris and What It Could Mean to Your Business
In the Gartner 2022 IT Trends report, they predicted that by 2026, at least 50 percent of C-Level executives will have cybersecurity performance requirements built into their employment contracts. So, it’s no mystery, then, why our newly launched CISO service has doubled in revenue in a single quarter.
On Coffeemakers, Quick Start Guides, and Why the Missing Piece in Your Vulnerability Scan Is Your MSP
In this complicated world, a quick start guide can make all the difference. So why then, are so many cybersecurity companies missing the opportunity to use that “quick start guide” mentality to create reports a company can actually act upon? If you have a vulnerability scanning and reporting program, you owe it to yourself to have an MSP that owns the program, can analyze the reams and reams of information that come in from it, and issue some doable suggestions for correcting your vulnerabilities. But before we get into all that, let’s first talk about what a vulnerability scan can do for your organization.