Blog

Blog

How to prevent cybersecurity incidents

For many businesses, cybersecurity can seem like the Wild West. There are good guys (cybersecurity pros like our team here at Vala Secure) and bad guys (hackers and other nefarious characters), plus a lot of townspeople seemingly caught in the middle and at the mercy of the good guys and bad guys. They’re just trying to go through their days

Read More…

How Do You Manage Managed Service Providers? [VIDEO]

 

"You can have all the metrics in the world. If there's no consequences, it's useless."

Here we spoke with Anne Benigsen after her presentation around best practices and strategies to manage vendors. She made some very strong points in her presentation about the control you really

Read More…

Technology Audits and Consulting: Achieving Separation of Duty

Do you fear you don't have the talent or funds to be able to keep your business secure? Is your IT person maxed out on projects that adding infosec to her plate might be too much? How can you find the balance between getting the cybersecurity expertise your business requires while not breaking the bank?

The Information Security space has

Read More…

What Are Your #cybersecuritywins?

At Vala Secure, one of our core beliefs is to pursue educational challenges. We believe that if organizations want to improve their security game there needs to be a continued sense of fun and challenge to get better. If it’s not fun or challenging, it’s harder to get better. So we want to embody that each and every day and I’m excited to announce

Read More…

Cybersecurity: Not Just For Financial Institutions

For many years, financial institutions have understood the importance of having a strong cybersecurity strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data

Read More…

4 Things to Watch For When Running an In-House Penetration Test

Businesses that keep sensitive data on their computer networks need penetration tests to make sure hackers do not have access to the information. Testing often starts with a vulnerability assessment, which is an exercise that evaluates the network's security and creates a list of potential security flaws. By scanning the network, you can often

Read More…

How Safe is Public Wi-Fi?

The modern digital age is more convenient than ever. Not only can you walk around with a tiny supercomputer in the palm of your hand, you can use that supercomputer to connect to the entire world over the internet, with multiple options for network protocols. However, when it comes to the cybersecurity of your mobile devices and the data they

Read More…

5 Smart Tips to Back Up Your Data Now

In a world where every company’s business is increasingly its own data, it’s always a good idea to ensure that data is backed up. This is especially true in the way it encourages adopting a proactive security mindset, allowing small and mid-sized businesses to address the risk of a cyber attack or security breach before it happens.As ransomware

Read More…

What Small Companies Should Really Know About Cloud Security

While the bulk of data security breaches affect large corporations, hackers can target small and medium-sized enterprises (SMEs), too. As a result, small businesses — often deemed an attractive target by cybercriminals because these companies lack the infrastructure of multi-million dollar conglomerates — are investing heavily in cloud security.

Read More…

Throwback Thursday: Revisit Old Viruses at the Online Malware Museum

In these times of mega-hacks and massive data breaches,  technology risk assessment  has become a fact of life for every business. In comparison to automated botnets, the “good old fashioned” human hacking of yesteryear seems quaint, even a little nostalgic. Do you remember the malware and viruses from the 1980s and 90s? The Online Malware Museum

Read More…