Posts by Shawn Corrigan
MSPs are Priority Targets for Hackers
Managed (IT) Services Providers, or “MSP”s, have increasingly become the target of hackers especially since the beginning of 2019. And as a result, over the last twelve months, several documented attacks have taken place, with various hacking groups gaining unauthorized access to thousands of computers and the computer networks of MSP’s clients. Once an MSP is breached,…
Read MoreIntro to the California Consumer Privacy Act (CCPA)
CCPA Compliance for Businesses The California Consumer Privacy Act (CCPA) comes into effect on January 1, 2020. Its provisions are focused on the protection of consumer privacy and will affect all companies dealing with consumer data in California. Companies will be required to ensure that they have comprehensive compliance policies in place to protect both…
Read MoreThe Dark Web
The Dark Web—Dangers That Lurk and How to Avoid Them Everyone who has ever been on the internet uses the Surface Web, which is the section of the World Wide Web that’s accessible to the public and searchable using the usual search engines. However, there’s a place on the internet where users are virtually untraceable:…
Read MoreBuilding a Vendor Management Program
Whether you want to make your internal and vendor audit programs better or need help creating them, it’s critical to engage an experienced team of professionals to help ensure you have everything in place to meet both your clients’ and your regulatory demands. Reviewing your current audit program may result in needing an upgrade—or even…
Read MoreBenefits of Using a Virtual CSO/CPO
ORGANIZATIONS NEED TO ANTICIPATE AREAS OF IT RISK AND STRATEGIZE TO MANAGE IT AT THE EXECUTIVE LEVEL. A virtual CSO can bring both strategic and operational leadership on security to companies that can’t afford a full-time person in the role. Security is crucial in a technological environment, especially with all the complex risks that accompany…
Read MoreBuilding A Security Awareness Program
Security Awareness Program – It’s not wise to assume that employees know even the most basic tenets of cybersecurity. To prepare employees for a sophisticated cyberattack, a cybersecurity professional is needed who understands that security requires a proactive approach and is always current on all the latest tactics of cybercriminals. Today’s business leaders may believe…
Read MoreComplying with Privacy Shield and GDPR
A MUST FOR DOING INTERNATIONAL DIGITAL BUSINESS TODAY. To combat the explosion of digital malefactors aiming to steal and disrupt, Privacy Shield and the General Data Protection Regulation have emerged to protect data and international business. Despite what the media may think, the interconnected global economy is nothing new. The economic collapse of the early…
Read MoreTop 10 Myths of Security Risk Analysis
Interactive Security strives to provide clarity in the complex world of Information Technology. Here, we review 10 of the top myths of IT Security Compliance and Risk Analysis: The security risk analysis is optional for small providers. False. All providers who are “covered entities” under HIPAA are required to perform a risk analysis. In addition,…
Read MoreUnderstanding Vulnerability Scanning and Penetration Testing ~ And why they both are important
Why You Need Both Penetration Testing and Vulnerability Scans Threats to data and system security have never been more numerous or sophisticated. Only last year, the City of Atlanta spent millions to restore their systems after a ransomware attack. Great Britain reported a 200 percent leap in ransomware attacks from 2018 into 2019. Even worse,…
Read MoreHow to protect against Ransomware Cyberattacks Strikes
Protect Vital Data and Operations Against Ransomware Cyberattacks Ransomware has seized a prime position in global headlines. Major targets, such as the city of Atlanta or an Australian heart hospital, gain most of the attention. Cybercriminals, however, understand that business, government, and nonprofit operations on a smaller scale struggle to pay for defenses against attack.…
Read More