Blog

Blog

How to Perform an IT Security Risk Assessment

If your business handles any sort of data, then cybersecurity is--or should be--a core part of your organizational process. You must know the various risks and potential flaws that could leave your customer data exposed to malicious use, and how to protect your company from threats such as hackers, viruses, and other cybersecurity vulnerabilities.

Read More…

5 Types of Compliance Audits (And Why You Should Know Them)

If your business has not undergone a compliance audit up until this point, it’s not something you should ignore until absolutely required to pay attention. In fact, the more prep work you can put in for the most relevant compliance audits for your company, the better. This way you are never caught unprepared and have your business hampered or even

Read More…

[Checklist] How to prepare for an ISO audit

Being audited for your ISO quality certification (whether to acquire such or maintain it) can be a stressful experience for many companies and teams. It instills many worries and is usually viewed as a negative process--but it’s far better to remember that it’s performed to ensure the quality of your internal processes to improve your customer

Read More…

Best Practices for cybersecurity audits For Law Firms

From Westlaw to Word, your law firm’s digital operations help advance client interests. While you work to protect your clients in the courtroom, clients are increasingly asking whether you also protect their data in the cyber arena. Law firm data presents a lucrative target - law firms are often viewed as “one-stop shops” for attackers – with

Read More…

A Complete Guide to the Information Security Lifecycle

When it comes to the safety of your data and technology systems, it’s vital that your organization recognizes the reality of the “information security lifecycle.” By its very name, the info security lifecycle indicates that true information security is a process, not a “one and done” solitary project. Information security has no end-point, and

Read More…

What are the different types of security penetration testing?

Security penetration testing (also known as pen testing) is often mixed up with the concept of vulnerability scanning for a corporate network. To clarify, vulnerability scanning is simply when cybersecurity professionals assess digital infrastructure and systems to find points of potential access or vulnerability.

On the other hand, security

Read More…

Common Forms of Social Engineering Attacks

Imagine: You receive an email from your company payroll department. The email confirms your request to change your direct deposit details for your most recent paycheck. You see that the paycheck has been deposited into a new account. The message indicates that your account has been successfully updated. One problem — you never submitted such a

Read More…

Law firm cybersecurity threats to keep aware of

Watch almost any movie from the 90s or early 2000s dealing with computers and you will see a highly stylized version of “hacking”. The scene will probably feature a t-shirt or hoodie-clad “hacker” sitting in a basement, surrounded with computer screens and green text. Cue to a closeup of the hacker furiously typing while green text scrolls down

Read More…

What type of information security officer does your company need?

Today’s data-centric businesses rely on a secure cyber environment to operate within. If you are a small firm, you may task contractors or your general IT support staff to handle your security needs. Mid-size to large firms, however, most likely employ an information security officer (ISO), also known as a Chief Information Security officer, or

Read More…

Shield yourself from healthcare's cybersecurity storm

A storm is on the horizon and if you are a part of the healthcare industry, prepare for rough seas. This storm, without rain or thunder, is digital and presents an even more burdensome proposition for healthcare organizations: the mass digitization of health and medical records (collectively, “EHRs”). In adopting new technologies to digitize

Read More…