| Blog, Compliance, SOC 2
Blog Does SOC 2 require data to be encrypted “at rest” or only “in transit“? Does SOC 2 require data to be encrypted “at rest” or only “in transit“? Installing strong firewalls and keeping your antivirus software up-to-date serve as excellent protections to promote...
| Blog, Information Security, News
In the era when smartphones have become indispensable in so many aspects of life, data breaches can be more devastating than ever before. The recent T-Mobile attack is a perfect example of such breaches. Here is what we know about the incident: The first and last...
| Blog, Penetration Testing
What Is Network Penetration Testing? Network Penetration Testing is a type of service performed by a penetration testing network. A security organization takes advantage of a series of networking penetration testing tools and attempts to break into an outside...
| Blog, Penetration Testing, Vulnerabilities and Threats
On December 8, 2020, corporate security management company FireEye reported on a serious issue in their blog. According to the publication, several of the company’s accounts had been “attacked by a highly sophisticated threat actor”, most likely a...
| Blog, Third Party Risk Management
Blog Vendor Key Performance Indicators Vendor Key Performance Indicators Any successful IT company must have an effective IT vendor KPI management. Regardless of how talented each individual in the company is, tracking the KPI of vendor management is critical for any...