Blog

Reactive Security the Pros and Cons

Reactive Security the Pros and Cons

  Why it’s hard to stop Reactive Security    Many find themselves in a cycle of reactive security. They are responsible for security but are part of small to mid-sized enterprises (SMEs). This situation means there is usually no formal 24/7 security operations...
Growing Cyber Insurance Concerns

Growing Cyber Insurance Concerns

Many small to medium-sized enterprises (SMEs), if they have not yet experienced the changes in cyber insurance, are in for a surprise. Whether you seek insurance for the first time or are renewing an existing policy, there will be changes. Cyber insurance concerns are...
CISA Exploited Vulnerability Catalog Increases by 21%

CISA Exploited Vulnerability Catalog Increases by 21%

  ‘That escalated quickly’ comes to mind when looking at the 95 new exploited vulnerabilities CISA added on March 3rd, then an additional 12 on March 7th. With these two additions, the known exploited vulnerability catalog increased by 21%. This represents a...
New HITRUST Assessment Options for Business Associates 

New HITRUST Assessment Options for Business Associates 

HITRUST has rolled out several changes providing new assessment options for organizations to achieve various levels of assurance. Overall, there are three assessments, each helping organizations to evaluate and understand the effectiveness of their cyber preparedness...
Cybersecurity Talent Crisis Will Forever Change IT

Cybersecurity Talent Crisis Will Forever Change IT

Even before the ‘great resignation’ companies were struggling to find, and keep cybersecurity talent. Those wanting and needing to strengthen their security are finding they cannot attain or afford the talent they are seeking.  Security teams are facing the highest...
What are the Benefits of Penetration Testing?

What are the Benefits of Penetration Testing?

The Gift of Penetration Testing Penetration testing is one of the best security investments a business can make. In-house IT or security lacks the objectivity to uncover and thoroughly test for the flaws that expose them to potential data breaches. Having an external...