Selected Tag: cybersecurity

Total posts: 24

What B2B Companies Need to Know About SOC 2 Compliance

What B2B Companies Need to Know About SOC 2 Compliance

Posted on September 22, 2020 - by Shannon McFarland

For B2B tech companies looking to grow and close deals with enterprise customers, getting SOC 2 compliant can open up many opportunities.  Passing a SOC 2 audit can be a ...

Read More
Infosec ROI: Get the Most Out of a Pen Test for Your Business

Infosec ROI: Get the Most Out of a Pen Test for Your Business

Posted on September 10, 2020 - by Sherif Koussa

It’s easy to feel like a fish out of water when it comes to knowing which pen test is right for you — whether you handle sensitive information, are required ...

Read More
Our Best Practices for Securing your Macbook

Our Best Practices for Securing your Macbook

Posted on April 2, 2020 - by Kyle Hankins

MacOS has privacy and security tools for hardening your computer. Here are our top tips and best practices to for securing your Macbook. Many of these tips are pretty straightforward, ...

Read More
How to Conduct a Cybersecurity Risk Assessment on Your Business

How to Conduct a Cybersecurity Risk Assessment on Your Business

Posted on June 9, 2020 - by Darren Gallop

Every business needs a cybersecurity risk assessment these days. Recognizing and understanding the specific risks facing your business makes you better prepared to plan for potential scenarios outside your control. ...

Read More
The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

Posted on January 22, 2020 - by Justin Gratto

Application security features sound like obvious items to put on your product roadmap. But since applications today are constantly changing and evolving, it becomes a never-ending marathon consisting of sprints ...

Read More
How to Complete Security Questionnaires [For Vendors]

How to Complete Security Questionnaires [For Vendors]

Posted on August 17, 2020 - by Darren Gallop

For technology vendors, data privacy and security questionnaires are increasingly common. But they are also becoming longer, more complex, and more of a burden for the companies receiving them.  ...

Read More
What to Know About Security Awareness Training for Your Business

What to Know About Security Awareness Training for Your Business

Posted on November 27, 2019 - by Russell Radzikowski

Security awareness training used to be a topic that only specific industries, or enterprise businesses, cared about. But with the rapid increase in cybercrime in the last several years, startups ...

Read More
How B2B Startups Are Evaluated for Risk By Enterprise Organizations

How B2B Startups Are Evaluated for Risk By Enterprise Organizations

Posted on November 1, 2019 - by Darren Gallop

If your B2B startup is selling to enterprise companies, there is no doubt you are noticing an increased level of scrutiny around your company’s information management practices. You ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
7 Tips for Office LAN Security

7 Tips for Office LAN Security

Posted on June 14, 2019 - by Darren Gallop

Office network security is the local area network (LAN) in the workspace or office. Security of this network is a top priority. It doesn't matter how big your company is ...

Read More
Guide to Starting a Basic Risk Assessment

Guide to Starting a Basic Risk Assessment

Posted on September 26, 2018 - by Laird Wilton

A risk assessment is one of the first steps in implementing your information security program, which will help provide an overview of your entire business. You'll use it to track ...

Read More
6 Reasons to Update Your Security Policies Right Now

6 Reasons to Update Your Security Policies Right Now

Posted on September 20, 2018 - by Shannon McFarland

With frequent data breaches in the news and regulators hammering down on security and privacy issues, many executives and technical leaders are updating their policies and procedures.  We recently ...

Read More
The Greatest Obstacle to Security Programs

The Greatest Obstacle to Security Programs

Posted on September 13, 2018 - by Laird Wilton

You'd think every business that deals with customer information and data would have a security program in place by now. But that’s not the reality. There are trends and ...

Read More
The Status of Marketing in the Aftermath of the GDPR

The Status of Marketing in the Aftermath of the GDPR

Posted on September 7, 2019 - by Colin MacInnis

What “GDPR Readiness” really looks like and how businesses say they’re doing it. The General Data Protection Regulation (GDPR) swept the nation in the later half of 2017. Companies holding ...

Read More
How to Start Implementing a Cybersecurity Program

How to Start Implementing a Cybersecurity Program

Posted on August 28, 2018 - by Laird Wilton

It is a major mistake to run a small or medium-sized business without any kind of cybersecurity program. But it’s not necessarily your fault, if that's the situation you ...

Read More
Buyers are Scrutinizing the Data Protection Practices of SMBs

Buyers are Scrutinizing the Data Protection Practices of SMBs

Posted on June 15, 2018 - by Laird Wilton

It’s no surprise that customers have high expectations for companies when it comes to data protection. In fact, 71% of consumers believe organizations have an obligation to control access to ...

Read More
A Poor Cyber Security Posture Damages Your Sales

A Poor Cyber Security Posture Damages Your Sales

Posted on June 12, 2018 - by Laird Wilton

If you’re a small business that’s selling, or hopes to sell, products to larger companies /organizations, you need to level-up your cyber security posture. Any weakness in your ...

Read More
How to Create an Incident Response Plan

How to Create an Incident Response Plan

Posted on July 16, 2020 - by Justin Gratto

Things happen – it’s an unfortunate reality when it comes to doing so much business with digital technology. And incidents can take many forms. From compromised passwords to phishing attacks ...

Read More
Cultivating a Security Culture: 5 Steps to Engage Your Team in Information Security

Cultivating a Security Culture: 5 Steps to Engage Your Team in Information Security

Posted on September 3, 2020 - by Laird Wilton

Having an information security culture can dramatically improve the overall security within your organization. That’s because your employees are the frontline of defense against cyberattacks and malicious actors. Cultivating ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence in ...

Read More
How to Setup a Password Protected Screensaver in macOS

How to Setup a Password Protected Screensaver in macOS

Posted on June 3, 2020 - by Kyle Hankins

A simple security step that can make all the difference  Many people are likely to disable the password-protected feature of their screensaver for the sake of convenience and time. But ...

Read More
Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Posted on August 7, 2020 - by Darren Gallop

Security culture helps make cybersecurity awareness second nature, letting your team focus on business while keeping the company safe. Your employees may be highly trained, diligent professionals. Yet, they’re ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Darryl MacLeod

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
How to Disable Automatic Login in macOS

How to Disable Automatic Login in macOS

Posted on August 5, 2020 - by Kyle Hankins

A guide for disabling automatic login on a Mac. Automatic login is designed to be a time-saving convenient feature for Mac users. It allows the user to simply open the ...

Read More