You’ve probably heard of the terms CISO or vCISO at some point in your security journey, but do you know what they mean and whether your business needs one? In this post, we cover what someone in the role of a CISO or vCISO does and when you may need one.
Technology Articles
Information Security Assessments – The Four Basic Types: Cyber Series Part 3
InfoSec assessments can provide businesses with a better understanding of their vulnerabilities. In this post, we cover the 4 basic types, how they differ and when you might use them.
How to Build an InfoSec Program: Cyber Series Part 2
Information Security is intimidating, and as a result, many people or companies take the path of avoidance or complacency. Today we want to take it back to the basics around what it takes to build an information security program, or as it is more commonly referred to an InfoSec Program.
Your Guide to Cybersecurity Acronyms: Cyber Series Part 1
Are you lost in a sea of cybersecurity acronyms? Have you been asked if your company utilizes EDR, SOC or SIEM but had no clue what that actually meant? If you find yourself nodding your head at the last two sentences, this blog post is for you.
How to Understand URLs to Identify Phishing
Despite an ever-changing digital world, email remains one of the most popular forms of communication. As a result, cybercriminals have come up with new and creative ways to use email to scam you out of personal or customer-sensitive information. In this post, we cover how to prevent phishing scams by learning how to read URLs.
Remote IT Management and Culture
With remote work here to stay, business leaders need to pay particular attention to how their IT programs are impacting company culture. In this article, we’ll explore the role of technology in remote company culture.