Blog

Blog

How to prevent cybersecurity incidents

For many businesses, cybersecurity can seem like the Wild West. There are good guys (cybersecurity pros like our team here at Vala Secure) and bad guys (hackers and other nefarious characters), plus a lot of townspeople seemingly caught in the middle and at the mercy of the good guys and bad guys. They’re just trying to go through their days

Read More…

How Do You Manage Managed Service Providers? [VIDEO]

 

"You can have all the metrics in the world. If there's no consequences, it's useless."

Here we spoke with Anne Benigsen after her presentation around best practices and strategies to manage vendors. She made some very strong points in her presentation about the control you really

Read More…

Technology Audits and Consulting: Achieving Separation of Duty

Do you fear you don't have the talent or funds to be able to keep your business secure? Is your IT person maxed out on projects that adding infosec to her plate might be too much? How can you find the balance between getting the cybersecurity expertise your business requires while not breaking the bank?

The Information Security space has

Read More…

Cybersecurity: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cybersecurity strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

Read More…

4 Things to Watch For When Running an In-House Penetration Test

Businesses that keep sensitive data on their computer networks need penetration tests to make sure hackers do not have access to the information. Testing often starts with a vulnerability assessment, which is an exercise that evaluates the network's security and creates a list of potential security flaws. By scanning the network, you can often

Read More…

How Safe is Public Wi-Fi?

The modern digital age is more convenient than ever. Not only can you walk around with a tiny supercomputer in the palm of your hand, you can use that supercomputer to connect to the entire world over the internet, with multiple options for network protocols. However, when it comes to the cybersecurity of your mobile devices and the data they

Read More…

5 Smart Tips to Back Up Your Data Now

In a world where every company’s business is increasingly its own data, it’s always a good idea to ensure that data is backed up. This is especially true in the way it encourages adopting a proactive security mindset, allowing small and mid-sized businesses to address the risk of a cyber attack or security breach before it happens.As ransomware

Read More…

What Small Companies Should Really Know About Cloud Security

While the bulk of data security breaches affect large corporations, hackers can target small and medium-sized enterprises (SMEs), too. As a result, small businesses — often deemed an attractive target by cybercriminals because these companies lack the infrastructure of multi-million dollar conglomerates — are investing heavily in cloud security.

Read More…

How CISOs Can Improve the Cybersecurity Landscape

In larger environments, it is not uncommon to have both a CIO/CTO and CISO (Chief Information Security Officer). The CTO/CIO is usually held accountable for the development and implementation of the IT strategy to support the institution's business strategy in line with its risk appetite. A CISO is typically responsible for overseeing and

Read More…

5 Common Programming Languages That Cause the Most Software Vulnerabilities

Over the last couple of years, many cybersecurity problems have come to light. There has been a wave of WordPress and Drupal vulnerability warnings and patches, and SQL injection bugs are being found left and right in Web applications. Many of the bugs can be traced back to PHP, but other common programming languages can also cause

Read More…