Selected Tag: information security

Total posts: 37

What B2B Companies Need to Know About SOC 2 Compliance

What B2B Companies Need to Know About SOC 2 Compliance

Posted on September 22, 2020 - by Shannon McFarland

For B2B tech companies looking to grow and close deals with enterprise customers, getting SOC 2 compliant can open up many opportunities.  Passing a SOC 2 audit can be a ...

Read More
What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

Posted on April 2, 2020 - by Justin Gratto

I write this as I sit in self-isolation, as our company has issued a strict policy of work from home. Many other people now find themselves in the same position, ...

Read More
Our Best Practices for Securing your Macbook

Our Best Practices for Securing your Macbook

Posted on April 2, 2020 - by Kyle Hankins

MacOS has privacy and security tools for hardening your computer. Here are our top tips and best practices to for securing your Macbook. Many of these tips are pretty straightforward, ...

Read More
6 Best Practices for Phishing Prevention

6 Best Practices for Phishing Prevention

Posted on August 18, 2020 - by Justin Gratto

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

Posted on March 13, 2020 - by Darren Gallop

A global pandemic and troubling economic trends spell trouble ahead for businesses without strong cybersecurity plans in place   As the coronavirus is spreading, we are recommending to our ...

Read More
How to Conduct a Cybersecurity Risk Assessment on Your Business

How to Conduct a Cybersecurity Risk Assessment on Your Business

Posted on June 9, 2020 - by Darren Gallop

Every business needs a cybersecurity risk assessment these days. Recognizing and understanding the specific risks facing your business makes you better prepared to plan for potential scenarios outside your control. ...

Read More
Top 5 Security Trends in 2020

Top 5 Security Trends in 2020

Posted on December 12, 2019 - by Justin Gratto

Security trends in 2020 will be driven by how innovative and lucrative the cybercrime industry is becoming. This is especially critical if you’re a founder or senior executive of a ...

Read More
6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Posted on December 4, 2019 - by Laird Wilton

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
How to Complete Security Questionnaires [For Vendors]

How to Complete Security Questionnaires [For Vendors]

Posted on August 17, 2020 - by Darren Gallop

For technology vendors, data privacy and security questionnaires are increasingly common. But they are also becoming longer, more complex, and more of a burden for the companies receiving them.  ...

Read More
Security Best Practices for Your Windows 10 Computer

Security Best Practices for Your Windows 10 Computer

Posted on November 18, 2019 - by Darryl MacLeod

Windows 10 comes with tons of great features for your business, including privacy and security tools for hardening your computer. This guide gives you our top tips and best practices for ...

Read More
Top Security Services and Tools for Your InfoSec Program

Top Security Services and Tools for Your InfoSec Program

Posted on November 5, 2019 - by Russell Radzikowski

If you're implementing a new InfoSec program to protect your company or demonstrate compliance, you WILL need policies. First, before you do anything else. You can't just google "security policies ...

Read More
How B2B Startups Are Evaluated for Risk By Enterprise Organizations

How B2B Startups Are Evaluated for Risk By Enterprise Organizations

Posted on November 1, 2019 - by Darren Gallop

If your B2B startup is selling to enterprise companies, there is no doubt you are noticing an increased level of scrutiny around your company’s information management practices. You ...

Read More
Why Every Company Needs a Disaster Recovery Policy

Why Every Company Needs a Disaster Recovery Policy

Posted on July 10, 2019 - by Darren Gallop

If a company relies on computers, it is highly likely that an IT failure would have a negative impact on the business - and make you wish you had a ...

Read More
But First, Security Policies and Procedures

But First, Security Policies and Procedures

Posted on July 5, 2019 - by Russell Radzikowski

I’ve seen first-hand what happens when companies fail to fully implement information security policies and procedures. It's hard to do it properly on your own. That's why as the ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
7 Tips for Office LAN Security

7 Tips for Office LAN Security

Posted on June 14, 2019 - by Darren Gallop

Office network security is the local area network (LAN) in the workspace or office. Security of this network is a top priority. It doesn't matter how big your company is ...

Read More
The Process Behind Third-Party Risk Management

The Process Behind Third-Party Risk Management

Posted on April 24, 2019 - by Darren Gallop

The decision to use a particular service or software is often already made before third-party risk management is engaged. Common process would be that a department head decides they want ...

Read More
How to Protect Yourself When You Travel & Security Tips

How to Protect Yourself When You Travel & Security Tips

Posted on March 26, 2019 - by Darren Gallop

Travel security isn't always the first thing on your mind when you're planning a business trip. But security is always a top priority when I'm working remotely and traveling. Not ...

Read More
Network Security in a Shared Workspace

Network Security in a Shared Workspace

Posted on March 13, 2019 - by Russell Radzikowski

Securing a business network seems straight forward when you have your own office or building that hosts only your employees. For many start-ups and smaller businesses, their physical office might ...

Read More
How to Build Your Security Team

How to Build Your Security Team

Posted on March 5, 2019 - by Darren Gallop

Building a security team within a company can be a time consuming and confusing process. There are many roles and branches of the Security Team. When assembling your team it’...

Read More
How to Secure Your Business for Free [16 Great Security Tools]

How to Secure Your Business for Free [16 Great Security Tools]

Posted on February 22, 2019 - by Darren Gallop

Many companies, especially small businesses or startups, start off with an information security program that relies on free security tools. One of the biggest hurdles to overcome in setting up ...

Read More
Securicy Launches Free Tools for Small Businesses

Securicy Launches Free Tools for Small Businesses

Posted on February 19, 2019 - by Colin MacInnis

The Struggle of Information Security Free tools can do a lot to improve things for small businesses. Information security has been an expensive part of business for many years. ...

Read More
The Future of InfoSec is Leadership

The Future of InfoSec is Leadership

Posted on January 29, 2019 - by Colin MacInnis

Today's business leaders are measured by their ability to relay brand consistency, authenticity, and company transparency. In addition, they’re judged on their corporate values, strategic vision, management practices, and ...

Read More
How Big Tech Companies Can Regain Customer Trust

How Big Tech Companies Can Regain Customer Trust

Posted on January 22, 2019 - by Darryl MacLeod

Distrust towards big tech firms has grown around the world. Users have legitimate reasons to be concerned about the large amounts of personal data they share with these companies. Big ...

Read More
Guide to Starting a Basic Risk Assessment

Guide to Starting a Basic Risk Assessment

Posted on September 26, 2018 - by Laird Wilton

A risk assessment is one of the first steps in implementing your information security program, which will help provide an overview of your entire business. You'll use it to track ...

Read More
How to Start Implementing a Cybersecurity Program

How to Start Implementing a Cybersecurity Program

Posted on August 28, 2018 - by Laird Wilton

It is a major mistake to run a small or medium-sized business without any kind of cybersecurity program. But it’s not necessarily your fault, if that's the situation you ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence in ...

Read More
Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Posted on August 7, 2020 - by Darren Gallop

Security culture helps make cybersecurity awareness second nature, letting your team focus on business while keeping the company safe. Your employees may be highly trained, diligent professionals. Yet, they’re ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Darryl MacLeod

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
How to Disable Remote Access for macOS

How to Disable Remote Access for macOS

Posted on July 24, 2020 - by Kyle Hankins

Features for “convenience” can often create security vulnerabilities Remote access is convenient because it allows a user to access your laptop using your administrator login and password. This is a ...

Read More
How to Use a Password Manager

How to Use a Password Manager

Posted on February 5, 2018 - by Darryl MacLeod

Password managers are great. We all know the struggles of staring at the computer screen trying to remember the password to a login. Thankfully, password management tools exist to save ...

Read More
Network Security for Startups: 4 Things to Do Right Now

Network Security for Startups: 4 Things to Do Right Now

Posted on August 11, 2020 - by Darren Gallop

In the whirlwind of things you need to accomplish for your startup, network security often falls by the wayside. It can be hard to make it a priority when a ...

Read More
7 Steps to Protect PII and Achieve Compliance in Your Company

7 Steps to Protect PII and Achieve Compliance in Your Company

Posted on July 23, 2020 - by Laird Wilton

Is your company taking adequate steps to protect your employee and customers’ personally identifiable information (PII)? If not, you need to be. Enterprise businesses are pressuring their vendors on security ...

Read More
5 Ways To Secure Local Data Backups for Your Company

5 Ways To Secure Local Data Backups for Your Company

Posted on August 20, 2020 - by Justin Gratto

Are you keeping local data backups? It might seem like everything is moving to the cloud these days, but maintaining local backups are a security best practice. Data backups that ...

Read More
Email Security: A Phishing Tale

Email Security: A Phishing Tale

Posted on July 5, 2017 - by Darryl MacLeod

Email phishing is tricky - it often comes from a sender you already know and trust. A few weeks ago my wife told me that she got an unexpected email ...

Read More
How to Protect Your Company from a Ransomware Attack

How to Protect Your Company from a Ransomware Attack

Posted on August 25, 2020 - by Darren Gallop

Do you have a strategy to protect your data from ransomware? If not, you need to develop one today. Ransomware can (and does!) wreak havoc on companies by locking up ...

Read More
5 Things to Secure Your Company Against Cyber Threats

5 Things to Secure Your Company Against Cyber Threats

Posted on February 24, 2017 - by Laird Wilton

Cyber threats are a serious business concern. Businesses and not-for-profit organizations are processing and storing larger and larger quantities of information about clients, members, employees, and partners. Much of it ...

Read More