-
Data Security, Basics and Best Practices
Data security, data protection, data privacy. Although these terms all sound similar, and they’re all related to securing your data, they mean different things. All three are parts of the…
-
Cybersecurity Awareness Month: Staying Secure in The Modern Digital World
Cyber security continues to be a critical concern for individuals and businesses. The digital landscape is filled with vulnerabilities and threats that can have severe consequences, ranging from data breaches…
-
Cybersecurity Concerns Should Scare You Into Action
October is Cybersecurity Awareness Month and it’s no coincidence that Halloween shares the same month because both can be pretty scary. However, just like with Halloween’s haunted houses and dark…
-
A Day at MSSP Alert Live
Late last week, while working with my team on our continued search for a Next Gen Security Information and Event Management (SIEM), Security Orchestration, Automation, and Response (SOAR), and User…
-
What is a SOC 2 Report and Why it is Necessary to your Firm
The Service Organization Control (SOC) 2 report demonstrates that an independent accounting and auditing firm has reviewed and examined an organization’s non-financial control objectives and activities and has rigorously tested…
-
A Primer on Vulnerability Management
You are a business that stores data on your organization’s network and wants to keep the network as secure as possible. Protecting your business assets has become a complex challenge…
-
Endpoint Security: What is it and why is it important?
Your firm has dozens, if not hundreds, of endpoints. These are your remote computing devices that communicate with a network – servers, virtual environments, desktops, laptops, workstations, tablets, smartphones, and…
-
2022 RSA Conference – 3 Key Takeaways
According to this article by CRN about this year’s RSA Security Conference, “cybersecurity is now in ‘fast-forward’ mode where attendees are almost in awe at the transformation of the industry since 2020.”…
-
Top 5 Cybersecurity Trends in 2022
It’s no secret that cybersecurity attacks and breaches have accelerated in recent years, but the growing impact and volume of such attacks has entered the public eye more aggressively than ever…
-
Your Security Posture: How to Ask, And Answer Questions About It
The question asked most infrequently regarding an organization’s cybersecurity is the most important—what are the underlying guiding principles that define your approach to security?
-
6 Security Best Practices to Keep Law Firms Secure
While securing client and firm data has always been a minimum requirement for law firms, the onslaught of successful ransomware attacks over the past 12 months undeniably demonstrates that information…