The latest information on Cyber Security, GRC and Privacy
Enhancing organization security via asset management with NIST CSF Control: ID.AM-1
Manage physical assets to manage security.
Are Electric Vehicle Charging Stations a Security Risk?
Critical infrastructure, IoT, is a target.
How Important is Your Security Posture
Your security posture can be a predictor of the likelihood of breach.
The 2021 Wisconsin Insurance Data Security Act
November 1, 2021 marks the first day of regulatory compliance for licensees within the Wisconsin insurance sector.
Def Con 28 Cancelled - Virtual Event Available
Even though our in-person Las Vegas event is canceled, we will run DEF CON 28 Safe Mode August 7-9 (Friday through Sunday) with 101 orientation Thursday – all of it remote.
Zoom Acquires Security
The acquisition of Keybase by Zoom video conferencing is a start toward secure communications on behalf of Clients. The importance of performing 3rd/4th party risk assessments remains.
The Cybersecurity Formality for the Board
Cybersecurity is not a foreign concept to the Board of Directors. It is just so often not an understood topic. Parallel in importance to operational excellence, Cybersecurity is there to ensure business operations continue to exist beyond the moment.
Security flaws in video conferencing has been a recent news topic
Security flaws in video conferencing has been a recent news topic. We should think of video conferencing the same as data we secure for our clients and our organization.
Maintaining POS Device Security and Cleanliness
Here is some helpful information on how to keep your Point of Sale devices safe. Electronics don't respond well to moisture, so the method requires a different approach to be secure and sanitized.
Expel.io, Eliminate Security Silos
Expel.io - eliminate security tool isolation and get down to automating response to cyber attacks to keep your organization safe.
Leading Privacy and Cybersecurity Law Firm Investigates Data Breach
Email phishing is still an easy way for malicious actors to gain access to your data and exfiltrate your intellectual property.