Selected Tag: cybersecurity

Total posts: 42

The Role and Responsibilities of the GDPR Data Protection Officer

The Role and Responsibilities of the GDPR Data Protection Officer

Posted on August 17, 2021 - by Sarah Berthiaume

Understanding everything there is to know about the GDPR can be quite the challenge, but you can start by designating a data protection officer, who is responsible internally for data ...

Read More
3 Principles of Infosec: The CIA Triad

3 Principles of Infosec: The CIA Triad

Posted on July 21, 2021 - by Sarah Berthiaume

Not to be confused with a well-known intelligence agency of the same acronym, the CIA Triad stands for Confidentiality, Integrity, and Availability. It is a model within Information Security that ...

Read More
Case Study: How Talkatoo Tackled HIPAA and SOC 2 Compliance (Without a Dedicated Security Team)

Case Study: How Talkatoo Tackled HIPAA and SOC 2 Compliance (Without a Dedicated Security Team)

Posted on August 2, 2021 - by Lorita Ba

We recently had the opportunity to interview Talkatoo’s CFO Aly Mawji for a customer case study. We discussed the importance of security in a rapidly growing tech company, their ...

Read More
What is Penetration Testing as a Service: The Benefits for SaaS Companies

What is Penetration Testing as a Service: The Benefits for SaaS Companies

Posted on July 29, 2021 - by Sherif Koussa

This guest post is from Software Secured, a Securicy partner. On the dark side of hacking, cybercriminals identify and exploit vulnerabilities as they break into a software application. Then they ...

Read More
6 Common Mistakes and Challenges with PCI DSS Compliance

6 Common Mistakes and Challenges with PCI DSS Compliance

Posted on June 9, 2021 - by Sarah Berthiaume

Service providers and retailers that accept credit cards can save tons of money and time on PCI DSS compliance by avoiding a few costly mistakes. Officially called the Payment Card ...

Read More
Why ISO 27001 Compliance is Important for Your Business

Why ISO 27001 Compliance is Important for Your Business

Posted on May 5, 2021 - by Laird Wilton

Cybersecurity and data protection are now one of the primary concerns for businesses and customers, making it essential for companies to implement the highest information security standards. Getting compliant with ...

Read More
Case Study: How  Gtmhub Saved Time Getting SOC 2 Ready

Case Study: How Gtmhub Saved Time Getting SOC 2 Ready

Posted on April 20, 2021 - by Lorita Ba

We recently had the opportunity to interview Gtmhub’s Co-Founder and CTO Radoslav Georgiev and Information Security Manager Ivan Dichev for a case study. We discussed the importance of security ...

Read More
Everything You Need to Know about GDPR Compliance

Everything You Need to Know about GDPR Compliance

Posted on April 7, 2021 - by Laird Wilton

Rising cybercrime rates and the irresponsible management of private data led to the European Union (EU) passing sweeping data protection laws in 2018. GDPR is a response to consumers becoming more ...

Read More
5 Ways to Improve Your SaaS Company’s  Information Security Posture

5 Ways to Improve Your SaaS Company’s Information Security Posture

Posted on March 24, 2021 - by Darren Gallop

Many SaaS companies overlook a key component of their business strategy: Security. From password management to secure coding to aligning with regulatory standards, SaaS companies often forego information security at ...

Read More
Sales Tips for Leveraging Your SOC 2 Report

Sales Tips for Leveraging Your SOC 2 Report

Posted on February 9, 2021 - by Martin Cozzi

Sales organizations are seeing longer and longer processing times when being evaluated for their security and compliance posture as a vendor. This lengthy process, commonly referred to as the procurement ...

Read More
5 Misconceptions SaaS Companies Have About Security

5 Misconceptions SaaS Companies Have About Security

Posted on February 17, 2021 - by Darren Gallop

As a SaaS company, you may be focusing on the wrong thing when it comes to your clients. SaaS companies wanting to sell to enterprise clients have a number of ...

Read More
State of SaaS Security: Insights for Startups from Joseph Kirkpatrick

State of SaaS Security: Insights for Startups from Joseph Kirkpatrick

Posted on January 27, 2021 - by Joseph Kirkpatrick

This article is part of Securicy’s new State of SaaS Security Series, which will have interviews from a diverse mix of security professionals, including CISOs, CTOs. Our goal ...

Read More
7 Steps to Understanding Your Cyber Insurance Needs

7 Steps to Understanding Your Cyber Insurance Needs

Posted on January 4, 2021 - by Jack Vines

This guest post is from Measured Insurance, a Securicy partner. Cyber insurance needs are becoming more critical for organizations of every size. And cybersecurity has never been a higher priority ...

Read More
2020 in Review: Securicy Product Updates

2020 in Review: Securicy Product Updates

Posted on December 22, 2020 - by Shannon McFarland

What a year. Despite 2020 throwing us all some curveballs, our whole team at Securicy was working hard to save you time while boosting your company's security posture. Prospects need assurance ...

Read More
The SOC 2 Audit: How to Get Your Business Ready

The SOC 2 Audit: How to Get Your Business Ready

Posted on October 18, 2021 - by Shannon McFarland

If your business is planning to get a SOC 2 audit in the future, it can look like a lot of work and time to get audit-ready. But when you break ...

Read More
What B2B Companies Need to Know About SOC 2 Compliance

What B2B Companies Need to Know About SOC 2 Compliance

Posted on September 22, 2020 - by Shannon McFarland

B2B companies who value SOC 2 compliance show enterprise customers that they are looking to grow and are prepared to close deals. Passing a SOC 2 audit can be a big ...

Read More
Infosec ROI: Get the Most Out of a Pen Test for Your Business

Infosec ROI: Get the Most Out of a Pen Test for Your Business

Posted on September 10, 2020 - by Sherif Koussa

This guest post on pen test ROI is from Software Secured, a Securicy partner. It’s easy to feel like a fish out of water when it comes to knowing ...

Read More
A Guide to Implementing ISO 27001 in Your Business

A Guide to Implementing ISO 27001 in Your Business

Posted on December 7, 2020 - by Justin Gratto

If you're selling to global companies, you're likely getting questions about whether you adhere to ISO 27001. This information security framework was designed to be an international standard for businesses to ...

Read More
OWASP Top 10: How to Address These Common Application Vulnerabilities in Your Business

OWASP Top 10: How to Address These Common Application Vulnerabilities in Your Business

Posted on November 19, 2020 - by Justin Gratto

Application vulnerabilities aren't always novel. In cybersecurity, there are a few vulnerabilities that professionals encounter often. In fact, a handful of them are so prominent that Open Web Application Security ...

Read More
Our Guide to Using the NIST Cybersecurity Framework for Your Business

Our Guide to Using the NIST Cybersecurity Framework for Your Business

Posted on November 27, 2020 - by Justin Gratto

The NIST Cybersecurity Framework is a comprehensive approach to security designed to help businesses better understand and manage their risk. If you’re looking for an approachable cybersecurity model that ...

Read More
Our Best Practices for Securing your Macbook

Our Best Practices for Securing your Macbook

Posted on May 21, 2021 - by Kyle Hankins

MacOS has privacy and security tools for hardening your computer. Here are our top tips and best practices to for securing your Macbook. Many of these tips are pretty straightforward, ...

Read More
How to Conduct a Cybersecurity Risk Assessment on Your Business

How to Conduct a Cybersecurity Risk Assessment on Your Business

Posted on June 9, 2020 - by Darren Gallop

Every business needs a cybersecurity risk assessment these days. Recognizing and understanding the specific risks facing your business makes you better prepared to plan for potential scenarios outside your control. ...

Read More
The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

The Cybersecurity Product Roadmap: 14 Application Security Features To Help Your Customers Be More Secure

Posted on January 22, 2020 - by Justin Gratto

Application security features sound like obvious items to put on your product roadmap. But since applications today are constantly changing and evolving, it becomes a never-ending marathon consisting of sprints ...

Read More
How to Complete Security Questionnaires [For Vendors]

How to Complete Security Questionnaires [For Vendors]

Posted on August 17, 2020 - by Darren Gallop

For technology vendors, data privacy and security questionnaires are increasingly common. But they are also becoming longer, more complex, and more of a burden for the companies receiving them.  ...

Read More
What to Know About Security Awareness Training for Your Business

What to Know About Security Awareness Training for Your Business

Posted on November 27, 2019 - by Russell Radzikowski

Security awareness training used to be a topic that only specific industries, or enterprise businesses, cared about. But with the rapid increase in cybercrime in the last several years, startups ...

Read More
How B2B Startups Are Evaluated for Risk By Enterprise Organizations

How B2B Startups Are Evaluated for Risk By Enterprise Organizations

Posted on November 1, 2019 - by Darren Gallop

If your B2B startup is selling to enterprise companies, there is no doubt you are noticing an increased level of scrutiny around your company’s information management practices. You ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
7 Tips for Office LAN Security

7 Tips for Office LAN Security

Posted on June 14, 2019 - by Darren Gallop

Office network security is the local area network (LAN) in the workspace or office. Security of this network is a top priority. It doesn't matter how big your company is ...

Read More
Guide to Starting a Basic Risk Assessment

Guide to Starting a Basic Risk Assessment

Posted on September 26, 2018 - by Laird Wilton

A risk assessment is one of the first steps in implementing your information security program, which will help provide an overview of your entire business. You'll use it to track ...

Read More
6 Reasons to Update Your Security Policies Right Now

6 Reasons to Update Your Security Policies Right Now

Posted on September 20, 2018 - by Shannon McFarland

With frequent data breaches in the news and regulators hammering down on security and privacy issues, many executives and technical leaders are updating their policies and procedures.  We recently ...

Read More
The Greatest Obstacle to Security Programs

The Greatest Obstacle to Security Programs

Posted on September 13, 2018 - by Laird Wilton

You'd think every business that deals with customer information and data would have a security program in place by now. But that’s not the reality. There are trends and ...

Read More
The Status of Marketing in the Aftermath of the GDPR

The Status of Marketing in the Aftermath of the GDPR

Posted on September 7, 2019 - by Colin MacInnis

What “GDPR Readiness” really looks like and how businesses say they’re doing it. The General Data Protection Regulation (GDPR) swept the nation in the later half of 2017. Companies holding ...

Read More
How to Start Implementing a Cybersecurity Program

How to Start Implementing a Cybersecurity Program

Posted on August 28, 2018 - by Laird Wilton

It is a major mistake to run a small or medium-sized business without any kind of cybersecurity program. But it’s not necessarily your fault, if that's the situation you ...

Read More
Buyers are Scrutinizing the Data Protection Practices of SMBs

Buyers are Scrutinizing the Data Protection Practices of SMBs

Posted on June 15, 2018 - by Laird Wilton

It’s no surprise that customers have high expectations for companies when it comes to data protection. In fact, 71% of consumers believe organizations have an obligation to control access to ...

Read More
A Poor Cyber Security Posture Damages Your Sales

A Poor Cyber Security Posture Damages Your Sales

Posted on June 12, 2018 - by Laird Wilton

If you’re a small business that’s selling, or hopes to sell, products to larger companies /organizations, you need to level-up your cyber security posture. Any weakness in your ...

Read More
How to Create an Incident Response Plan

How to Create an Incident Response Plan

Posted on July 16, 2020 - by Justin Gratto

Things happen – it’s an unfortunate reality when it comes to doing so much business with digital technology. And incidents can take many forms. From compromised passwords to phishing attacks ...

Read More
Cultivating a Security Culture: 5 Steps to Engage Your Team in Information Security

Cultivating a Security Culture: 5 Steps to Engage Your Team in Information Security

Posted on September 3, 2020 - by Laird Wilton

Having an information security culture can dramatically improve the overall security within your organization. That’s because your employees are the frontline of defense against cyberattacks and malicious actors. Cultivating ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence ...

Read More
How to Setup a Password Protected Screensaver in macOS

How to Setup a Password Protected Screensaver in macOS

Posted on June 3, 2020 - by Kyle Hankins

A simple security step that can make all the difference  Many people are likely to disable the password-protected feature of their screensaver for the sake of convenience and time. But ...

Read More
Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Posted on August 7, 2020 - by Darren Gallop

Security culture helps make cybersecurity awareness second nature, letting your team focus on business while keeping the company safe. Your employees may be highly trained, diligent professionals. Yet, they’re ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Shannon McFarland

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
How to Disable Automatic Login in macOS

How to Disable Automatic Login in macOS

Posted on August 5, 2020 - by Kyle Hankins

A guide for disabling automatic login on a Mac. Automatic login is designed to be a time-saving convenient feature for Mac users. It allows the user to simply open the ...

Read More