Selected Tag: information security

Total posts: 50

The Role and Responsibilities of the GDPR Data Protection Officer

The Role and Responsibilities of the GDPR Data Protection Officer

Posted on August 17, 2021 - by Sarah Berthiaume

Understanding everything there is to know about the GDPR can be quite the challenge, but you can start by designating a data protection officer, who is responsible internally for data ...

Read More
5 Tips to Protect Personal Information and Data Privacy

5 Tips to Protect Personal Information and Data Privacy

Posted on August 18, 2021 - by Sarah Berthiaume

Today all organizations need to protect the personal information they store that identifies either employees, customers, clients, or business partners. Some of this information is usually important to conduct operations ...

Read More
3 Principles of Infosec: The CIA Triad

3 Principles of Infosec: The CIA Triad

Posted on July 21, 2021 - by Sarah Berthiaume

Not to be confused with a well-known intelligence agency of the same acronym, the CIA Triad stands for Confidentiality, Integrity, and Availability. It is a model within Information Security that ...

Read More
Cloud Storage vs. Local Storage: 19 Pros and Cons

Cloud Storage vs. Local Storage: 19 Pros and Cons

Posted on July 28, 2021 - by Ashley MacDonald

This guest post is from 45Drives who provides affordable high-performance, high-capacity, enterprise storage solutions for all industries and all size data requirements. What is better: cloud storage versus local storage?&...

Read More
What is Privacy Program Management?

What is Privacy Program Management?

Posted on July 14, 2021 - by Kyle Hankins

Privacy Program Management is a growing field that encompasses the management of privacy concepts, policies, procedures, and programs at the organizational level. It begins with establishing a privacy program framework ...

Read More
How Vendor Due Diligence Mitigates Third-Party Risk in 4 Steps

How Vendor Due Diligence Mitigates Third-Party Risk in 4 Steps

Posted on June 30, 2021 - by Sarah Berthiaume

What is vendor due diligence? Vendor due diligence is essentially the investigation phase that occurs before a company enters into a relationship with a vendor to avoid any potential “buyer's ...

Read More
6 Common Mistakes and Challenges with PCI DSS Compliance

6 Common Mistakes and Challenges with PCI DSS Compliance

Posted on June 9, 2021 - by Sarah Berthiaume

Service providers and retailers that accept credit cards can save tons of money and time on PCI DSS compliance by avoiding a few costly mistakes. Officially called the Payment Card ...

Read More
Case Study: How  Gtmhub Saved Time Getting SOC 2 Ready

Case Study: How Gtmhub Saved Time Getting SOC 2 Ready

Posted on April 20, 2021 - by Lorita Ba

We recently had the opportunity to interview Gtmhub’s Co-Founder and CTO Radoslav Georgiev and Information Security Manager Ivan Dichev for a case study. We discussed the importance of security ...

Read More
5 Cybersecurity Trends of 2021

5 Cybersecurity Trends of 2021

Posted on March 9, 2021 - by Laird Wilton

This year's COVID-19 pandemic has become a pivot point for businesses around the world. Industries have had to adapt and implement technology to allow for virtual operations, seemingly overnight. And ...

Read More
Sales Tips for Leveraging Your SOC 2 Report

Sales Tips for Leveraging Your SOC 2 Report

Posted on February 9, 2021 - by Martin Cozzi

Sales organizations are seeing longer and longer processing times when being evaluated for their security and compliance posture as a vendor. This lengthy process, commonly referred to as the procurement ...

Read More
State of SaaS Security: Insights for Startups from Joseph Kirkpatrick

State of SaaS Security: Insights for Startups from Joseph Kirkpatrick

Posted on January 27, 2021 - by Joseph Kirkpatrick

This article is part of Securicy’s new State of SaaS Security Series, which will have interviews from a diverse mix of security professionals, including CISOs, CTOs. Our goal ...

Read More
2020 in Review: Securicy Product Updates

2020 in Review: Securicy Product Updates

Posted on December 22, 2020 - by Shannon McFarland

What a year. Despite 2020 throwing us all some curveballs, our whole team at Securicy was working hard to save you time while boosting your company's security posture. Prospects need assurance ...

Read More
How to Get Your Business Ready for a SOC 2 Audit

How to Get Your Business Ready for a SOC 2 Audit

Posted on May 5, 2021 - by Shannon McFarland

If your business is planning to get a SOC 2 audit in the future, it can look like a lot of work and time to get audit-ready. But when you break ...

Read More
What B2B Companies Need to Know About SOC 2 Compliance

What B2B Companies Need to Know About SOC 2 Compliance

Posted on September 22, 2020 - by Shannon McFarland

B2B companies who value SOC 2 compliance show enterprise customers that they are looking to grow and are prepared to close deals. Passing a SOC 2 audit can be a big ...

Read More
What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

What Businesses Can Do About Increasing Cybersecurity Risks Due to COVID-19

Posted on April 2, 2020 - by Justin Gratto

I write this as I sit in self-isolation, as our company has issued a strict policy of work from home. Many other people now find themselves in the same position, ...

Read More
Our Best Practices for Securing your Macbook

Our Best Practices for Securing your Macbook

Posted on May 21, 2021 - by Kyle Hankins

MacOS has privacy and security tools for hardening your computer. Here are our top tips and best practices to for securing your Macbook. Many of these tips are pretty straightforward, ...

Read More
6 Best Practices for Phishing Prevention

6 Best Practices for Phishing Prevention

Posted on August 18, 2020 - by Justin Gratto

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

During Covid-19 Pandemic, Businesses Should Prepare for Increase in Cyber Crime

Posted on March 13, 2020 - by Darren Gallop

A global pandemic and troubling economic trends spell trouble ahead for businesses without strong cybersecurity plans in place   As the coronavirus is spreading, we are recommending to our ...

Read More
How to Conduct a Cybersecurity Risk Assessment on Your Business

How to Conduct a Cybersecurity Risk Assessment on Your Business

Posted on June 9, 2020 - by Darren Gallop

Every business needs a cybersecurity risk assessment these days. Recognizing and understanding the specific risks facing your business makes you better prepared to plan for potential scenarios outside your control. ...

Read More
Top 5 Security Trends in 2020

Top 5 Security Trends in 2020

Posted on December 12, 2019 - by Justin Gratto

Security trends in 2020 will be driven by how innovative and lucrative the cybercrime industry is becoming. This is especially critical if you’re a founder or senior executive of a ...

Read More
6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

6 Best Practices For Email Security (Or, How Not to Be the Source of a Ransomware Attack at Your Company)

Posted on December 4, 2019 - by Laird Wilton

Your email accounts are where you are most vulnerable to being a victim of a cybercrime. Yet email security is often forgotten, even though a surprising number of attacks use ...

Read More
How to Complete Security Questionnaires [For Vendors]

How to Complete Security Questionnaires [For Vendors]

Posted on August 17, 2020 - by Darren Gallop

For technology vendors, data privacy and security questionnaires are increasingly common. But they are also becoming longer, more complex, and more of a burden for the companies receiving them.  ...

Read More
Security Best Practices for Your Windows 10 Computer

Security Best Practices for Your Windows 10 Computer

Posted on May 21, 2021 - by Shannon McFarland

Windows 10 comes with tons of great features for your business, including privacy and security tools for hardening your computer. This guide gives you our top tips and best practices for ...

Read More
Top Security Services and Tools for Your InfoSec Program

Top Security Services and Tools for Your InfoSec Program

Posted on November 5, 2019 - by Russell Radzikowski

If you're implementing a new InfoSec program to protect your company or demonstrate compliance, you WILL need policies. First, before you do anything else. You can't just google "security policies ...

Read More
How B2B Startups Are Evaluated for Risk By Enterprise Organizations

How B2B Startups Are Evaluated for Risk By Enterprise Organizations

Posted on November 1, 2019 - by Darren Gallop

If your B2B startup is selling to enterprise companies, there is no doubt you are noticing an increased level of scrutiny around your company’s information management practices. You ...

Read More
Why Every Company Needs a Disaster Recovery Policy

Why Every Company Needs a Disaster Recovery Policy

Posted on July 10, 2019 - by Darren Gallop

If a company relies on computers, it is highly likely that an IT failure would have a negative impact on the business - and make you wish you had a ...

Read More
But First, Security Policies and Procedures

But First, Security Policies and Procedures

Posted on July 5, 2019 - by Russell Radzikowski

I’ve seen first-hand what happens when companies fail to fully implement information security policies and procedures. It's hard to do it properly on your own. That's why as the ...

Read More
Top Security Trends for 2019

Top Security Trends for 2019

Posted on July 2, 2019 - by Darren Gallop

Now that we’re halfway through 2019, let’s take a look at our top five security trends for the year 2019. Some of these might seem obvious to you, which means ...

Read More
7 Tips for Office LAN Security

7 Tips for Office LAN Security

Posted on June 14, 2019 - by Darren Gallop

Office network security is the local area network (LAN) in the workspace or office. Security of this network is a top priority. It doesn't matter how big your company is ...

Read More
The Process Behind Third-Party Risk Management

The Process Behind Third-Party Risk Management

Posted on April 24, 2019 - by Darren Gallop

The decision to use a particular service or software is often already made before third-party risk management is engaged. Common process would be that a department head decides they want ...

Read More
How to Protect Yourself When You Travel & Security Tips

How to Protect Yourself When You Travel & Security Tips

Posted on March 26, 2019 - by Darren Gallop

Travel security isn't always the first thing on your mind when you're planning a business trip. But security is always a top priority when I'm working remotely and traveling. Not ...

Read More
Network Security in a Shared Workspace

Network Security in a Shared Workspace

Posted on March 13, 2019 - by Russell Radzikowski

Securing a business network seems straight forward when you have your own office or building that hosts only your employees. For many start-ups and smaller businesses, their physical office might ...

Read More
How to Build Your Security Team

How to Build Your Security Team

Posted on March 5, 2019 - by Darren Gallop

Building a security team within a company can be a time consuming and confusing process. There are many roles and branches of the Security Team. When assembling your team it’...

Read More
How to Secure Your Business for Free [16 Great Security Tools]

How to Secure Your Business for Free [16 Great Security Tools]

Posted on February 22, 2019 - by Darren Gallop

Many companies, especially small businesses or startups, start off with an information security program that relies on free security tools. One of the biggest hurdles to overcome in setting up ...

Read More
Securicy Launches Free Tools for Small Businesses

Securicy Launches Free Tools for Small Businesses

Posted on February 19, 2019 - by Colin MacInnis

The Struggle of Information Security Free tools can do a lot to improve things for small businesses. Information security has been an expensive part of business for many years. ...

Read More
The Future of InfoSec is Leadership

The Future of InfoSec is Leadership

Posted on January 29, 2019 - by Colin MacInnis

Today's business leaders are measured by their ability to relay brand consistency, authenticity, and company transparency. In addition, they’re judged on their corporate values, strategic vision, management practices, and ...

Read More
How to Regain Customer Trust: Can Big Tech Companies Recover from a Data Breach?

How to Regain Customer Trust: Can Big Tech Companies Recover from a Data Breach?

Posted on October 27, 2020 - by Laird Wilton

We love to look to big tech companies as inspirational success stories, but are they really gleaming examples to which we should look up to? Despite their apparent success, some ...

Read More
Guide to Starting a Basic Risk Assessment

Guide to Starting a Basic Risk Assessment

Posted on September 26, 2018 - by Laird Wilton

A risk assessment is one of the first steps in implementing your information security program, which will help provide an overview of your entire business. You'll use it to track ...

Read More
How to Start Implementing a Cybersecurity Program

How to Start Implementing a Cybersecurity Program

Posted on August 28, 2018 - by Laird Wilton

It is a major mistake to run a small or medium-sized business without any kind of cybersecurity program. But it’s not necessarily your fault, if that's the situation you ...

Read More
How Hackers Target Printers: Best Practices for Office or Home Printer Security

How Hackers Target Printers: Best Practices for Office or Home Printer Security

Posted on August 13, 2020 - by Justin Gratto

There’s one overlooked device that can result in a security or privacy breach: the printer.  Printers aren't always considered in a company’s cybersecurity strategy, despite their presence ...

Read More
Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Security Culture: How Employees Can Protect Your Company (or Be Your Weakest Link)

Posted on August 7, 2020 - by Darren Gallop

Security culture helps make cybersecurity awareness second nature, letting your team focus on business while keeping the company safe. Your employees may be highly trained, diligent professionals. Yet, they’re ...

Read More
Strong Passwords and 4 Types of Passwords You Should NEVER Use

Strong Passwords and 4 Types of Passwords You Should NEVER Use

Posted on March 1, 2018 - by Shannon McFarland

Strong passwords are a good defense against persistent cyber attackers but weak passwords can be the entryway to confidential data and operating systems. While there are so many types of ...

Read More
How to Disable Remote Access for macOS

How to Disable Remote Access for macOS

Posted on June 13, 2021 - by Kyle Hankins

Remote access for your macOS is convenient because it allows a user to access your laptop using your administrator login and password. This is a convenient tool in certain situations ...

Read More
How to Use a Password Manager

How to Use a Password Manager

Posted on February 5, 2018 - by Shannon McFarland

Password managers are great. We all know the struggles of staring at the computer screen trying to remember the password to a login. Thankfully, password management tools exist to save ...

Read More
Network Security for Startups: 4 Things to Do Right Now

Network Security for Startups: 4 Things to Do Right Now

Posted on August 11, 2020 - by Darren Gallop

In the whirlwind of things you need to accomplish for your startup, network security often falls by the wayside. It can be hard to make it a priority when a ...

Read More
7 Steps to Protect PII and Achieve Compliance in Your Company

7 Steps to Protect PII and Achieve Compliance in Your Company

Posted on July 23, 2020 - by Laird Wilton

Is your company taking adequate steps to protect your employee and customers’ personally identifiable information (PII)? If not, you need to be. Enterprise businesses are pressuring their vendors on security ...

Read More
5 Ways To Secure Local Data Backups for Your Company

5 Ways To Secure Local Data Backups for Your Company

Posted on August 20, 2020 - by Justin Gratto

Are you keeping local data backups? It might seem like everything is moving to the cloud these days, but maintaining local backups are a security best practice. Data backups that ...

Read More
Email Security: A Phishing Tale

Email Security: A Phishing Tale

Posted on July 5, 2017 - by Darryl MacLeod

Email phishing is tricky - it often comes from a sender you already know and trust. A few weeks ago my wife told me that she got an unexpected email ...

Read More
How to Protect Your Company from a Ransomware Attack

How to Protect Your Company from a Ransomware Attack

Posted on August 25, 2020 - by Darren Gallop

Do you have a strategy to protect your data from ransomware? If not, you need to develop one today. Ransomware can (and does!) wreak havoc on companies by locking up ...

Read More
5 Things to Secure Your Company Against Cyber Threats

5 Things to Secure Your Company Against Cyber Threats

Posted on February 24, 2017 - by Laird Wilton

Cyber threats are a serious business concern. Businesses and not-for-profit organizations are processing and storing larger and larger quantities of information about clients, members, employees, and partners. Much of it ...

Read More