The latest information on Cyber Security, GRC and Privacy



Is it possible to reliably outsource critical technology and security functions?

image

Yes, however it must be done thoughtfully to mitigate risks. But, the benefits are substantial.

Read more ...






How to significantly reduce the likelihood and impact of data breaches.

image

Aligning your cybersecurity program with NIST Cybersecurity Framework (CSF) Version 2.0

Read more ...






Enhancing organization security via asset management with NIST CSF Control: ID.AM-1

image

Manage physical assets to manage security.

Read more ...












Are Electric Vehicle Charging Stations a Security Risk?

image

Critical infrastructure, IoT, is a target.

Read more ...









How Important is Your Security Posture

image

Your security posture can be a predictor of the likelihood of breach.

Read more ...









The 2021 Wisconsin Insurance Data Security Act

image

November 1, 2021 marks the first day of regulatory compliance for licensees within the Wisconsin insurance sector.

Read more ...









Zoom Acquires Security

image

The acquisition of Keybase by Zoom video conferencing is a start toward secure communications on behalf of Clients. The importance of performing 3rd/4th party risk assessments remains.

Read more ...





The Cybersecurity Formality for the Board

image

Cybersecurity is not a foreign concept to the Board of Directors. It is just so often not an understood topic. Parallel in importance to operational excellence, Cybersecurity is there to ensure business operations continue to exist beyond the moment.

Read more ...



Security flaws in video conferencing has been a recent news topic

image

Security flaws in video conferencing has been a recent news topic. We should think of video conferencing the same as data we secure for our clients and our organization.

Read more ...





Maintaining POS Device Security and Cleanliness

image

Here is some helpful information on how to keep your Point of Sale devices safe. Electronics don't respond well to moisture, so the method requires a different approach to be secure and sanitized.

Read more ...





Leading Privacy and Cybersecurity Law Firm Investigates Data Breach

image

Email phishing is still an easy way for malicious actors to gain access to your data and exfiltrate your intellectual property.

Read more ...