How Can I Hire a Virtual CISO For My Business?
by Jeffrey Torrance on February 4, 2025 at 3:15 PM
As cybersecurity threats continue to evolve, businesses—especially small and mid-sized enterprises (SMEs)—are increasingly recognizing the need for strong security leadership. However, hiring a full-time Chief Information Security Officer (CISO) may not always be feasible due to budge …
Leveraging a Virtual CISO (vCISO) for SOC 2 Compliance
by Jeffrey Torrance on January 10, 2025 at 1:00 PM
In the rapidly evolving landscape of cybersecurity and data privacy, achieving and maintaining compliance with industry standards like SOC 2 is critical for businesses of all sizes. However, this process can be daunting, especially for organizations lacking the internal expertise or r …
Is a Cybersecurity Degree Worth It? Considering Pros & Cons
by Jeffrey Torrance on July 5, 2024 at 11:30 AM
The modern era has brought with it a heightened need for cybersecurity professionals to protect sensitive data and systems. With cyber threats constantly evolving, the demand for skilled cybersecurity experts is at an all-time high. This brings us to an important question: Is a cybers …
What Is a Whaling Attack? (With Examples)
by Jeffrey Torrance on April 25, 2024 at 5:21 PM
Cybercriminals deploy a wide variety of techniques to target both individuals and organizations, aiming to extract sensitive information. With numerous social engineering strategies at play, many are curious to know, "what is whale phishing?" Whaling attacks, often referred to as CEO …
Making Sense of Data Management
by Jeffrey Torrance on February 9, 2023 at 2:45 PM
Organizations face a prevalence of both internal and external cyber threats. This makes data management one of the most critical components in an organization’s cybersecurity program. From classifying data, to ensuring it is handled with the appropriate security precautions, to ensuri …
Weighing Your Multi-Factor Authentication Options
by Jeffrey Torrance on April 14, 2022 at 2:30 AM
At this point most of us have heard that securing our accounts with only passwords, no matter how complex, is not enough. Do not get me wrong, requiring strong passwords (14 or more characters, composed of uppercase and lowercase letters, and including symbols and numbers) is essentia …