The latest information on Info/Cyber Security, GRC and Privacy



How Important is Your Security Posture

image

Your security posture can be a predictor of the likelihood of breach.

Read more ...









The 2021 Wisconsin Insurance Data Security Act

image

November 1, 2021 marks the first day of regulatory compliance for licensees within the Wisconsin insurance sector.

Read more ...









Def Con 28 Cancelled - Virtual Event Available

image

Even though our in-person Las Vegas event is canceled, we will run DEF CON 28 Safe Mode August 7-9 (Friday through Sunday) with 101 orientation Thursday – all of it remote.

Read more ...





Zoom Acquires Security

image

The acquisition of Keybase by Zoom video conferencing is a start toward secure communications on behalf of Clients. The importance of performing 3rd/4th party risk assessments remains.

Read more ...





The Cybersecurity Formality for the Board

image

Cybersecurity is not a foreign concept to the Board of Directors. It is just so often not an understood topic. Parallel in importance to operational excellence, Cybersecurity is there to ensure business operations continue to exist beyond the moment.

Read more ...



Security flaws in video conferencing has been a recent news topic

image

Security flaws in video conferencing has been a recent news topic. We should think of video conferencing the same as data we secure for our clients and our organization.

Read more ...





Maintaining POS Device Security and Cleanliness

image

Here is some helpful information on how to keep your Point of Sale devices safe. Electronics don't respond well to moisture, so the method requires a different approach to be secure and sanitized.

Read more ...





Expel.io, Eliminate Security Silos

image

Expel.io - eliminate security tool isolation and get down to automating response to cyber attacks to keep your organization safe.

Read more ...





Leading Privacy and Cybersecurity Law Firm Investigates Data Breach

image

Email phishing is still an easy way for malicious actors to gain access to your data and exfiltrate your intellectual property.

Read more ...