With the latest reports revealing stats like 250 new malware threats occur every minute and the average cost of a data breach is $3.86 million, it’s no wonder so many organizations feel it’s time to hire a chief information security officer (CISO). But what do you do if you have the need for a...CISO
Many businesses find Alagen when looking for a specific piece of technology to purchase. Perhaps you’re looking for the latest in firewall solutions or email security tools. The security consulting industry has done a good job of training businesses to start with the tech and build out from there....security solutions
In September, the National Institute of Standards and Technologies released NIST IR 8228. The report overviews unique risks organizations face from the proliferation of IoT (Internet of Things). Essentially, it’s one of the first detailed approaches to securing IoT environments. NIST IR 8228...IoT
With ever increasing security threats, new protocols and responsive solutions, we frequently come across gaps in network access control. These often-overlooked gaps are significant. Eliminating them could reduce the need for damage control by 50% or greater. Our suggestion: follow the basic and...network access control
By now we’ve all heard of the Internet of Things (IoT) and have a pretty good understanding of what it means for both businesses and consumers. This ecosystem of embedded hardware, mobile, cloud applications, data, and the underlying networks that support them is revolutionary. Most exciting,...IoT
On August 14, the NIST Small Business Cybersecurity Act was signed by the President into law. As small businesses are heavily targeted and more likely to be vulnerable to cyberattacks than larger enterprises, the commitment to assist the SMB market was more important than many realize.
(Guest blog written for the Arizona Hospital and Healthcare Association)healthcare
Always been a fan of the Center for Internet Security's CIS Controls and the value they provide in giving 20 prioritized actions that should be considered by organizations to protect their data from cyberattacks. Their latest release is more good work. Here are the three updates that we like the...