Featured

Delano Collins
9 Apr 2019

On March 5th, the Federal Trade Commission (“FTC”) proposed amendments to the Safeguards Rule and Privacy Rule under the Gramm-Leach-Bliley Act (“GLBA”).  These amendments are significant in several ways. However, the most impactful will be the...

Read the Article
Additional articles

On March 5th, the Federal Trade Commission (“FTC”) proposed amendments to the Safeguards Rule and Privacy Rule under the Gramm-Leach-Bliley Act (“GLBA”).  These amendments are significant in several ways. However, the most impactful will be the changes to the Safeguards Rule which governs the information security programs of financial institutions.

Read the Article

           With all the talk surrounding cybersecurity, it is easy for the owner of a small business to be overwhelmed.  The good news is that you don’t have to feel overwhelmed.  While there are no magic bullets, using a layered approach to securing your network is still the most effective way to protect it. Below is my common sense checklist, based loosely on the CIS Controls and broken into three sections based on complexity, for securing your small business.

Read the Article

        Account takeover has skyrocketed in the past year, partially because phishing emails continue to evolve and many organizations simply lack the tools to monitor unusual account behavior with cloud services.  Below is a list of signs your Office 365 account may be hacked.

Read the Article

Recently, I was asked, "Does security monitoring make you more secure?" Aside from the obvious qualitative benefits, this question immediately prompted my curiosity to see exactly how much risk is reduced. As a provider of security monitoring services, we are in a unique position to provide quantifiable results to this question using data spanning a number of clients.

Read the Article
1 2 3 4

Get Your No-Obligation Consultation Today

CONTACT US