Author: Justin Gratto

Total posts: 11

Your Essential Guide to HIPAA Compliance: A Checklist for Vendors

Your Essential Guide to HIPAA Compliance: A Checklist for Vendors

Posted on May 11, 2020 - by Justin Gratto

If your business is looking to expand into the healthcare sector (or has customers who are doing so), you know how quickly questions about HIPAA compliance start to come up. ...

Read More
What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

Posted on April 2, 2020 - by Justin Gratto

I write this as I sit in self-isolation, as our company has issued a strict policy of work from home. Many other people now find themselves in the same position, ...

Read More
6 Best Practices for Phishing Prevention

6 Best Practices for Phishing Prevention

Posted on August 18, 2020 - by Justin Gratto

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

Posted on January 22, 2020 - by Justin Gratto

Application security features sound like obvious items to put on your product roadmap. But since applications today are constantly changing and evolving, it becomes a never-ending marathon consisting of sprints ...

Read More
How to Use the CIS Controls Framework for Your Business

How to Use the CIS Controls Framework for Your Business

Posted on January 15, 2020 - by Justin Gratto

For businesses, leveraging a framework like CIS Controls makes sure your company and customer data stay safe. You want to use trusted security and privacy frameworks for your business and ...

Read More
Why Your Business Needs a Penetration Test

Why Your Business Needs a Penetration Test

Posted on December 28, 2019 - by Justin Gratto

When it comes to developing cybersecurity strategies, planning and assessing existing infrastructure only goes so far. To create an airtight security plan, you also need to view your company from ...

Read More
Top 5 Security Trends in 2020

Top 5 Security Trends in 2020

Posted on December 12, 2019 - by Justin Gratto

Security trends in 2020 will be driven by how innovative and lucrative the cybercrime industry is becoming. This is especially critical if you’re a founder or senior executive of a ...

Read More
How to Create an Incident Response Plan

How to Create an Incident Response Plan

Posted on July 16, 2020 - by Justin Gratto

Things happen – it’s an unfortunate reality when it comes to doing so much business with digital technology. And incidents can take many forms. From compromised passwords to phishing attacks ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence in ...

Read More
5 Ways To Secure Local Data Backups for Your Company

5 Ways To Secure Local Data Backups for Your Company

Posted on August 20, 2020 - by Justin Gratto

Are you keeping local data backups? It might seem like everything is moving to the cloud these days, but maintaining local backups are a security best practice. Data backups that ...

Read More
Cheatsheet: Everything You Need to Know About Information Security Policies

Cheatsheet: Everything You Need to Know About Information Security Policies

Posted on August 10, 2020 - by Justin Gratto

Do you have formal information security policies written down in your company? At this point, they’re necessary for every business. However, developing security policies is a daunting task, especially ...

Read More