Blog
The Importance of Cybersecurity Auditing: Ensuring Compliance and Business Success
The notion of being audited is often associated with negative connotations. It can even be a little scary. Let’s face it, no one wants to get a letter from their country’s tax enforcement division that they are being audited. Whenever there is some type of governmental scandal, the first course of action is to conduct…
-
Navigating Cybersecurity Compliance Challenges
Over the past few decades, the business world shifted from filing cabinets overflowing with paperwork to a cloud-first approach where pen and paper are obsolete. Today we live in an almost limitless digital world that has afforded well-intentioned businesses with uncountable advantages. However, as our reliance on technology has grown, so too has the threat…
-
The Importance of Cybersecurity Auditing: Ensuring Compliance and Business Success
The notion of being audited is often associated with negative connotations. It can even be a little scary. Let’s face it, no one wants to get a letter from their country’s tax enforcement division that they are being audited. Whenever there is some type of governmental scandal, the first course of action is to conduct…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Preventing Insider Threats with a Prevention Program
We like to think that all threats come from the outside, that the people who want to perform malice upon us or our organizations are total strangers. Unfortunately, that is just not the case. An uncomfortable statistic comes from the FBI. According to 2011 homicide data, 54.3% of murder victims were killed by someone they…
-
Building A Cybersecurity Compliance Program
As if IT managers and CIOs didn’t have enough on their plates already, many are finding themselves with another heaping scoop of responsibility to manage: compliance. Various regulatory bodies set compliance requirements, which differ from country to country or even state to state in the US. For a company to be compliant, it must meet…
-
What Is the NIS 2 Directive and How Does It Affect You?
The NIS Directive was adopted in July 2015 and implemented in the European Union on May 9, 2018. The directive published a series of cybersecurity requirements for operators of essential services and digital service providers. The aim was to enhance the security and resilience of critical infrastructure and services by enforcing a high common level…