BLOG

5 Real-World Uses for Blockchain in Security

In our most recent article, we explored the ways on which blockchain can be utilized to prevent potential cyber-fraud and decrease the probability for breaches.

Read More

Could Blockchain Be the Answer to User Cybersecurity?

As technology becomes more advanced, organizations must adapt their strategies to protect and organize their most critical assets

Read More

Protecting Critical Student Data with Advanced Cybersecurity

Safeguarding your critical assets and systems is important for every organization—especially for school districts, where student and staff data is particularly sensitive.

Read More

Collection #1: What We Can Learn from the Largest-Ever Public Breach

The sheer volume of data leaked in the latest large-scale breach is a major cause for concern. In the history of megabreaches – like the Equifax data breach in July of 2017, which affected 143 million consumers in the U.S. – there has never been a breach quite like this one.

Read More

Google Fined by French Data Protection Agency for Lack of Transparency

France’s Data Protection Authority (Commission Nationale de l’Informatique et des Libertés), also known as CNIL, recently fined Google LLC a 50 million euro fine for violating restrictions under the General Data Protection Regulation (GDPR) laws.

Read More

The Importance of Transitional Due Diligence During Acquisitions

As the facts of the latest major data breach were revealed—this time, affecting some 500 million customers at the Marriott International-owned Starwood hotel chain—cyber security experts contemplated how the rupture could have been avoided.

Read More

You Only Know What You Know: Why Information Event Management is Critical to Security Programs

 

Are you monitoring your data and security program on an ongoing basis?

 

Even if your answer is “yes,” it’s unlikely that you combine security information management (SIM) and security event management (SEM) in one streamlined monitoring system.

Read More

Cybersecurity New Year’s Resolutions for IT & Security Executives

 

It wasn’t long ago that we said our farewells to 2018. With every new year comes the opportunity to bring a fresh perspective to existing practices within your organization, such as cyber security.

Read More

How to Fight the Most Common Scams this Holiday Season

Demonstrating return on investment (ROI) is crucial to the success of selling a security service, including the need for penetration tests, or “pen tests.” However, ROI from services like these is not always clear.

Read More

Cost Benefits of a Penetration Test

 

Demonstrating return on investment (ROI) is crucial to the success of selling a security service, including the need for penetration tests, or “pen tests.” However, ROI from services like these is not always clear.

BLOG

ARCHIVE

  • Are Your Organization’s Credentials Under Threat?

  • 10 Security and Privacy Policies Every Organization Should Have

  • The Key to Preventing Unauthorized Access: Account Management

Read More

A Lookback: National Cyber Security Awareness Month

 

The line between our online and offline lives has been blurred.

Read More

Core Elements of Effective Penetration Test Remediation

 

A penetration test, or a “pen test,” involves a variety of both manual and automated techniques that simulate a cyberattack on an organization’s data and security. To prioritize a holistic approach to cyber defense, organizations need to understand the environment under protection, the anomalies affecting the security of the system and—most importantly—the plan for remediation.

Read More

Key Components of an Effective Penetration Test

Penetration testing, or “pen testing,” is a vital part of every cyber defense program. Without regularly conducting pen testing, organizations cannot identify potential avenues of attack. In order to defend against attacks, organizations must be prepared, which means understanding the types of attack that may arise and withstanding an attack if one occurs.

Read More

Modern operating systems are organized to meet the needs of various users. User accounts, from the standpoint of a consumer, are meant to be configured and customized based on the needs of the individual who will be in control of the account. Regardless of the ultimate purpose of the account, several security-related considerations come into play that need to be addressed by proper information technology (IT) infrastructure.

Read More

5100 Darrow Road, Suite B

Hudson, OH 44236

877-390-3950 Office