Mobile Threats Skyrocket

Mobile Threats Skyrocket

Although mobile devices are portable, powerful, and convenient, their use in employees’ jobs is coming at a price. The very features that make them compelling also render them especially vulnerable to hacking. Data shows that nearly one-third of zero-day attacks...
Hacked US Companies to Face New Reporting Requirements

Hacked US Companies to Face New Reporting Requirements

When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...
2022 Revisions to ISO 27002

2022 Revisions to ISO 27002

Blog  2022 Revisions to ISO 27002 2022 Revisions to ISO 27002 Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on...
SOC 2 Report Example

SOC 2 Report Example

Blog  SOC 2 Report Example SOC 2 Report Example SOC 2 reports are essential for any organization that handles customer data, ensuring that your systems are secure, available, and private. Essentially, a SOC 2 report gives your customers peace of mind, knowing that...
High Severity WordPress Plugin Bug Hits Three Million

High Severity WordPress Plugin Bug Hits Three Million

According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users’ data. As a...
Security Concerns are Biggest Barrier to Cloud Adoption

Security Concerns are Biggest Barrier to Cloud Adoption

The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that their organizations expect to expand their cloud deployments. To that end, many are enhancing the scope and extent of their...
Researchers Warn of New Log4Shell-Like Java Vulnerability

Researchers Warn of New Log4Shell-Like Java Vulnerability

Security experts are driving our attention to the Log4Shell vulnerability in Java again. It has been around for several months. Although this new vulnerability known as CVE-2021-42392 has not yet been published in the National Vulnerability Database (NVD), experts are...
Patch Log4j Now or Risk Major Fines

Patch Log4j Now or Risk Major Fines

Your information security vigilance can never be allowed to flag. Recently, the Federal Trade Commission underscored the importance of that point about the newly discovered Log4 Shell vulnerability. Companies that fail to take preemptive action by installing a patch...
SOC 2 Cost In 2023

SOC 2 Cost In 2023

With cybersecurity concerns at an all-time high, organizations cannot afford to downsize or procrastinate when it comes to protecting your and your customer’s systems and data. Combine these realities with an increase in the use of employee personal devices and...
Growing Amount of Phishing Attacks During the Holiday Season

Growing Amount of Phishing Attacks During the Holiday Season

Along with the good cheer and gifts that are hallmarks of the holiday season comes a much less welcome phenomenon: phishing attacks. The vast majority, well over 90 percent, are conducted through a company’s email system. During that high-traffic time between...