For many years, financial institutions have understood the importance of having a strong cyber security strategy. As they handle valuable financial information and other sensitive data, these institutions have long been very attractive targets for hackers. As a result, they know they have to work hard to keep their customers’ accounts and data
Legal firms face a range of security threats, from theft of sensitive data to malware that can wreak havoc on company computer systems. Penetration testing allows legal firms to test their information security systems to ensure they can stand up to the latest threats. The official definition of a penetration test is that it is a planned, legal
Once again, it’s time to plan your security budget for the next year. In our last post, we discussed planning and implementing as the first two steps of planning your 2016 security budget. Now, let’s look at the final two steps: execution and analysis.
Successful execution of a security plan involves detecting new risks and monitoring
You don’t have to be overwhelmed planning your IT risk management for 2016. Simply follow the four steps outlined over these two posts to create your 2016 budget.
First, define the security policies and controls that you’ll use to protect your company’s assets. As an example, you might implement the security policy “employees
You’ve all seen the headlines - big company data breaches, foreign hackers, databases stolen. You can’t make it a day anymore without the next information security headline.It can be scary to some, difficult to understand for many, and it’s the fastest moving target in the business world today. So, what should a firm like yours do about it
Improving the information security policy for your firm can be condensed down to three simple steps. These are the most common problems seen with firms and practices across the country, and they're easy for you to fix.
1. Realize the prevalence of the cloud
It's very common for the people writing information security policies to not be
Employee data exposure in the legal industry can leave employees vulnerable, lead to identify theft, and jeopardize the integrity of a legal office. That’s why it’s important for you to take the necessary steps to protect against data exposure as well as understand the techniques hackers use in order to implement successful countermeasures. This