application security planning

Why Application Security Should Begin at Planning As cybersecurity threats become more potent and prevalent, the need to make apps more secure by identifying and fixing vulnerabilities and enhancing their security is critical. Application security has been getting more attention lately, especially after the Veracode “State of Software Security Vol. 10” report revealed that 83…

Read More
Did your Pandemic Plan Perform

Worldwide health crises like the COVID-19 global pandemic, SARS in 2003 and the avian flu of 2008 are bleak reminders of how governments, social institutions and economies can succumb to biological forces beyond human control. The breakdown in the socio-political and economic fabric of affected nations — both developed and developing — reveal how lack…

Read More
data security compliance - Vendor Management Program

How to Ensure Vendor Compliance Data security compliance regulations are designed to help companies ensure the integrity, security and availability of the sensitive data they handle. Organizations must comply with these rules and guidelines to protect their systems and data from security breaches and other types of risks. With the tremendous amount of data handled and…

Read More
covid-19 dark web

It’s no secret that large corporations and SMBs alike are struggling in the wake of the COVID-19 pandemic as social distancing measures slow global economic activity. Unfortunately, bad actors are not taking time off. In fact, the rapid shift to telework has only made company data more vulnerable, increasing the importance of comprehensive security. When times are tough, no company can afford…

Read More
Nist 800-171 compliance

NIST 800-171—All You Need to Know In this day and age, information is king. This means that data handling and recordkeeping are critical processes that help businesses build and maintain the trust and confidence of their vendors, contractors, partners, and customers. Of course, when the federal government gets involved in any way, cybersecurity for the protection…

Read More
NIST 800-171

Achieving NIST 800-171 Compliance For organizations handling controlled unclassified information (CUI), ensuring data protection is paramount as this data can be a target for serious, sophisticated cyberattacks. In fact, past and current orchestrated attacks on programs and assets containing CUI have prompted the Department of Defense (DoD) to work with and get the assistance of…

Read More
Cybersecurity Auditing

Why a Focus on Cybersecurity is Critical? Cybersecurity Auditing, data breaches, and other digital era dangers show up in headlines every day.  The even more sobering reality is that most of these events never become public knowledge.  In other words, we only hear about a small percentage of the incidents. Just within the past few…

Read More
risk assessment

A best practice for protecting IT systems against everchanging and costly cyber threats Yearly assessments are necessary because no organization in the 21st century can afford for IT systems to face compromise without a plan of defense, response, and recovery. For some organizations, yearly reports are an exercise in box checking. Leadership wants reports, but…

Read More
HIPAA Risk Assessment

A cyberattack could mean a significant loss of business, lawsuits or much worse. Performing regular risk assessments help generate a greater sense of trust with clients and investors and as a result, better position companies to win business and strengthen their reputation. Is it ever “OK” for a company to be willing to risk losing…

Read More