| Information Security, Managed Security
When you are on the front lines charged with the critical duty of ensuring that your company’s information and systems are as protected as possible from risk, your data security strategy needs to be complex and multi-layered. Threats can come in numerous forms:...
| Third Party Risk Management
There is nothing revolutionary about companies enlisting the services of outside vendors, suppliers, providers and contractors; companies have been engaging in this practice for generations. However, modern businesses do need to confront additional challenges when it...
| Information Security, Managed Security
The Federal Financial Institutions Examination Council (FFIEC) is a governmental body made up of five banking regulators. Its objective is to promote uniformity in the supervision of financial institutions. To that end, it provides organizations with a FFIEC...
| Information Security, Managed Security
Regardless of where you do business in the United States, you already know that the security of your stored and transmitted private data is of paramount importance. However, individual states implement their own laws to ensure that this sensitive information is...
| Blog, ISO 27001, SOC, SOC 2
Blog SOC 2 vs. ISO 27001: Key Differences SOC 2 vs. ISO 27001: Key Differences Deciding between SOC 2 and ISO 27001 certifications can be like choosing the correct key for a specific lock. One focuses on managing how service providers handle customer data, while the...
| Blog, Managed Security, Penetration Testing
Blog AWS Penetration Testing AWS Penetration Testing Amazon Web Services (AWS) platform supports a wide variety of business activities that include data storage, web application services, networking and code development. Unfortunately, it has recently become all too...
| Information Security, Managed Security
Any management or human resource professional knows that standards and practices can never be truly implemented and enforced unless and until they are thoroughly documented. As you might imagine, this maxim also holds true when it comes to protecting your network,...