


Hacked US Companies to Face New Reporting Requirements
When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...
2022 Revisions to ISO 27002
Blog 2022 Revisions to ISO 27002 2022 Revisions to ISO 27002 Impacts on ISO 27001 ISO 27002 is the companion standard to ISO 27001 and provides best practices for implementing information security controls. The latest version, ISO 27002:2022, was published on...
SOC 2 Report Example
Blog SOC 2 Report Example SOC 2 Report Example SOC 2 reports are essential for any organization that handles customer data, ensuring that your systems are secure, available, and private. Essentially, a SOC 2 report gives your customers peace of mind, knowing that...
High Severity WordPress Plugin Bug Hits Three Million
According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users’ data. As a...
Security Concerns are Biggest Barrier to Cloud Adoption
The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that their organizations expect to expand their cloud deployments. To that end, many are enhancing the scope and extent of their...
More Organizations Suffered Phishing Attacks in 2021 Than in 2020
Thanks to intense media focus on the issue, the end-users of digital products should be much more aware of the dangers of data breaches. Nevertheless, every indication is that cyber attacks such as phishing schemes continue to increase in severity. In fact, a...
Researchers Warn of New Log4Shell-Like Java Vulnerability
Security experts are driving our attention to the Log4Shell vulnerability in Java again. It has been around for several months. Although this new vulnerability known as CVE-2021-42392 has not yet been published in the National Vulnerability Database (NVD), experts are...
Google Docs Comments Exploit Allows for Distribution of Phishing and Malware
From students to corporate executives, workgroups of all types benefit from both Google Docs and the larger Google Workspace platforms. Due to the preponderance of remote work during the pandemic, groups have remained productive thanks to the productivity these...
Patch Log4j Now or Risk Major Fines
Your information security vigilance can never be allowed to flag. Recently, the Federal Trade Commission underscored the importance of that point about the newly discovered Log4 Shell vulnerability. Companies that fail to take preemptive action by installing a patch...
SOC 2 Cost In 2023
With cybersecurity concerns at an all-time high, organizations cannot afford to downsize or procrastinate when it comes to protecting your and your customer’s systems and data. Combine these realities with an increase in the use of employee personal devices and...