With ever increasing security threats, new protocols and responsive solutions, we frequently come across gaps in network access control. These often-overlooked gaps are significant. Eliminating them could reduce the need for damage control by 50% or greater. Our suggestion: follow the basic and...network access control
By now we’ve all heard of the Internet of Things (IoT) and have a pretty good understanding of what it means for both businesses and consumers. This ecosystem of embedded hardware, mobile, cloud applications, data, and the underlying networks that support them is revolutionary. Most exciting,...IoT
On August 14, the NIST Small Business Cybersecurity Act was signed by the President into law. As small businesses are heavily targeted and more likely to be vulnerable to cyberattacks than larger enterprises, the commitment to assist the SMB market was more important than many realize.
(Guest blog written for the Arizona Hospital and Healthcare Association)healthcare
Always been a fan of the Center for Internet Security's CIS Controls and the value they provide in giving 20 prioritized actions that should be considered by organizations to protect their data from cyberattacks. Their latest release is more good work. Here are the three updates that we like the...