How Effective Is Truecaller at Protecting You from Scams?
by Nicholas Foisy on July 31, 2024 at 1:42 PM
Truecaller has become a vital tool for many users seeking to protect themselves from scam calls and unwanted communications. By leveraging a comprehensive database of phone numbers and real-time identification, the app helps users make informed decisions about whether to answer incomi …
HITRUST Certification vs. SOC 2: A Simple Comparison
by William DePalma on July 26, 2024 at 11:30 AM
As organizations prioritize data security and privacy, they often seek out certifications and audits that demonstrate their methodology to protect sensitive information. Two frameworks in this context are HITRUST Certification (Health Information Trust Alliance) and SOC 2 (Service Org …
Integrating Cybersecurity Education in the K-12 Curriculum
by Nicholas Foisy on July 25, 2024 at 4:07 PM
Cybersecurity has become a cornerstone of our digital society, influencing every aspect of our lives from personal privacy to national security. Given its importance, integrating cybersecurity education into the K-12 curriculum is not just an option; it is a necessity. But how do we w …
Lessons Learned from the CrowdStrike Tech Outage
by Jesse Roberts on July 22, 2024 at 3:00 PM
The recent global outage caused by CrowdStrike's faulty update has highlighted crucial lessons for organizations worldwide. By examining the factors that led to this disruption and understanding how to mitigate similar risks, organizations can enhance their resilience and ensure conti …
Which NIST Standard Is Most Important for Small Businesses?
by Andrew Paull on July 19, 2024 at 2:53 PM
Navigating the complexities of cybersecurity can be challenging for small businesses, but the National Institute of Standards and Technology (NIST) offers robust frameworks to help. This blog analyzes the various NIST initiatives and guidelines designed to enhance cybersecurity for sm …
Beyond Data Classification: Unlocking the Power of Data Insights
by Adam Lyford on July 17, 2024 at 11:30 AM
In today's data-driven world, businesses are inundated with vast amounts of data. While organizing this information through data classification—categorizing data based on defined criteria—is crucial, the real magic happens when we extract and leverage deeper insights from this data. T …
Nobody Is Exempt from Vendor Security Questionnaires
by CJ Hurd on July 12, 2024 at 12:00 PM
Increased supply chain and vendor breaches have underscored the critical importance of vendor security questionnaires for safeguarding organizational security. These questionnaires have emerged as essential tools for organizations to evaluate the security practices of their third-part …
Once Human Terms of Service Highlights Growing Privacy Concerns
by Nicholas Foisy on July 10, 2024 at 4:45 PM
The recent launch of "Once Human," a survival game published by NetEase and developed by Starry Studios, has been met with significant controversy and mixed reviews. The primary concern revolves around the game's privacy policy, specifically the collection of personal data, including …
What Are the 5 Trust Services Criteria (TSC) for SOC 2?
by Kyle Daun on July 10, 2024 at 1:00 PM
Adhering to industry standards is crucial for organizations that manage sensitive data and rely on robust information systems. The SOC 2 Trust Services Criteria (TSC) provides a comprehensive framework to ensure systems are secure, available, and reliable. This blog will explore the f …
Is a Cybersecurity Degree Worth It? Considering Pros & Cons
by Jeffrey Torrance on July 5, 2024 at 11:30 AM
The modern era has brought with it a heightened need for cybersecurity professionals to protect sensitive data and systems. With cyber threats constantly evolving, the demand for skilled cybersecurity experts is at an all-time high. This brings us to an important question: Is a cybers …
A Detailed History of SOC 2 Compliance
by Rachel Hughes on July 2, 2024 at 12:30 PM
Security threats do not only come from bad actors online or suspicious links in an email. Have you considered the security threats posed by your organization’s closest entities – like vendors and partners? Third party service providers may unknowingly pose security threats to their co …