Questions? Contact Us

 

What is gained from Cybersecurity and Physical Security Convergence?

It amazes me that I still sometimes hear people talking about cybersecurity (logical security) and physical security as if they're separate issues to address and manage. Today, in our connected world, that's not the case at all. Our digital world has produced a convergence of physical and logical security that brings value to how you protect your m...
Continue reading
1581 Hits
0 Comments

Tips for Optimizing PCI Compliance

​Sparked by the increase in credit card fraud, PCI DSS compliance went into effect in 2004 to help protect cardholder data. The Payment Card Industry Data Security Standard (PCI DSS) applies to all entities that store, process, and/or transmit cardholder data and those entities that can impact this data. The only exception is Telco Companies that o...
Continue reading
1133 Hits
0 Comments

Five must-haves in any disaster recovery plan

In January the United States saw some of the coldest temperatures on record, an earthquake outside of San Francisco, and mudslides in California. Those Mother Nature events probably didn't affect anyone's computer up time, but they could have. Cold temps produce ice which can break trees and cause damage to equipment; earthquakes can topple buildin...
Continue reading
841 Hits
0 Comments

Can your business pass the data privacy test?

In addition to being Blueberry Pancake Day, Sunday, Jan. 28, 2018, is Data Privacy Day. Data Privacy Day is led by the National Cyber Security Alliance (NCSA) in the United States. According to NCSA: "Data Privacy Day commemorates the 1981 signing of Convention 108, the first legally binding international treaty dealing with privacy and d...
Continue reading
864 Hits
0 Comments

Three Practices for Defending Against the Threat from Inside

Cybersecurity Insiders and Crowd Research Partners recently released their "Insider Threat 2018 Report." The report surveyed 472 cybersecurity professionals about their view and position on the threat posed by "insiders" – the employees and partners that have access to an organization's business operating systems and data. The report reminds us tha...
Continue reading
824 Hits
0 Comments