ensuring security

Ensuring Security and Compliance

Ensuring Security and Compliance Most organizations tend to focus on becoming compliant rather than being secure. And while meeting client requirements and industry regulations is very important, it does not necessarily guarantee that your organization is secure. If your entire information security program is based on “What must we do to be compliant?”, you’re probably…

information security program

Information Security Program Is Critical

Information Security Program Is Critical An information security program is a critical component of any organization regardless of the size of your business or the industry you’re in. A good information security program consists of a comprehensive set of information security policies and procedures, which is the cornerstone to any information security program. Whether you’re…

Ransomeware Defense

WannaCrypt Ransomware Defense

WannaCrypt Ransomware Defense Looking for WannaCrypt ransomware defense? On Friday, May 12th, a large ransomware attack was launched, known as WannaCrypt (a.k.a. WannaCry). It infected more than 230,000 computers across 150 countries. This unprecedented cyberattack left organizations struggling in the aftermath as they try to recover. WannaCrypt demands payment of ransom in bitcoin and has…

debt collection

Debt Collection and Audits for Collection Agencies

Debt Collection and Audits for Collection Agencies Debt collection agencies with sensitive data need to be familiar with how PCI, FISMA, SSAE 16/SOC 1 and SOC 2 apply to them. If you’re performing collections, you’re no stranger to regulatory compliance and the proactive supervision of government agencies such as the Federal Trade Commission (FTC), Consumer…

penetration tests

Penetration Tests and Their Benefits

Penetration Tests and Their Benefits Penetration tests and their benefits on the brain? If performed regularly, penetration tests are key to your overall security posture. It’s an important practice that gives organizations visibility into real-world threats to your security. As part of a routine security check, penetration tests allow you to find the gaps in…

cyber intrusions surprise

Strategies for Mitigating Cyber Intrusions

Strategies for Mitigating Cyber Intrusions Cyber intrusions worrying you? Looking for some basic strategies that your IT team can use to mitigate cyber intrusions? Here are four tips, courtesy of the Australian government. As part of its mission, the Australian Signals Directorate, an Australian government intelligence agency, provides advice and assistance on information and communications…

cost of downtime

Cost of Downtime

Cost of Downtime Ever calculate the cost of downtime? A major new survey by Veeam Software did, and the results reveal that there’s far more to system downtime than the bracing hard costs. In its fifth annual “Availability Report,” Veeam interviewed 1,140 senior IT staff in 24 countries, including 150 U.S. folks.  All of the…