Skip to main content

Blog

Sheltered Harbor: A Safe Haven from the Perfect Storm

Wednesday, February 6, 2019

Sheltered Harbor: A Safe Haven from the Perfect Storm

Sheltered Harbor is a relatively new concept that is being realized today to address new and existing cybersecurity threats that could affect the financial sector on a massive scale. The idea is to create extremely secure (and segmented) backups of financial data across the financial sector with the...

Read More...

Categories: Blog

Four Steps to Better Business Continuity Plan Testing

Wednesday, January 16, 2019

Four Steps to Better Business Continuity Plan Testing

If you’ve never enacted your BCP, it’s hard to be confident that your plan will be sufficient. Testing helps to continuously improve your ability to successfully recover from various scenarios. Follow these steps to build a better BCP testing program and ensure you are prepared for any situation.

Read More...

Categories: Blog

Where's the Value in Company Data on Your Network?

Friday, December 14, 2018

Where's the Value in Company Data on Your Network?

We often ask what information clients are trying to protect on their network. The main answer always boils down to customer SSN and account numbers. While it’s important to protect “personally identifiable information” on your network, it is imperative to realize that additional company information ...

Read More...

Categories: Blog

Dissecting the Marriott Data Breach Response

Wednesday, December 5, 2018

Dissecting the Marriott Data Breach Response

Another week goes by, and we have absolutely no shortage of breach-related news. This week’s top story focuses on one of the largest breaches we have seen today, impacting the Marriott-owned Starwood hotel chain. While Marriott’s breach notification was fairly standard, its response has been heavily...

Read More...

Categories: Blog, In the News

FSSCC Releases New Cybersecurity Framework

Wednesday, December 5, 2018

FSSCC Releases New Cybersecurity Framework

The FSSCC has released a new cybersecurity framework call the “Cybersecurity Profile.” The overall intent is to combine a large number of different cybersecurity standards from all over the world into one framework that’s scalable and more efficient than the other frameworks on the market today. Doe...

Read More...

Categories: Blog
Page 4 of 17First   Previous   1  2  3  [4]  5  6  7  8  9  10  Next   Last