VA Data Breach Exposes the Personal Info of 46,000 Veterans
by CJ Hurd on September 24, 2020 at 1:00 PM
Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.
Situational Awareness – How Strong Are Your Spidey Senses?
by Peter Fellini on September 17, 2020 at 3:15 PM
How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.
Elements of Quality Security and Privacy Awareness Training
by Patrick Hughes on September 3, 2020 at 3:00 PM
As information technology professionals, we often hear the term security awareness training. Most organizations know they need to be conducting continuous security awareness training, whether the goal is to check a box for a framework/regulation they must adhere to, or they genuinely …
Can the Election Be Hacked?
by Jesse Roberts on August 27, 2020 at 2:15 PM
The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …
New York Files First 23 NYCRR 500 Enforcement Action
by Nicholas Foisy on August 20, 2020 at 1:00 PM
On July 21st, 2020, the New York Department of Financial Services (NYDFS) announced that it had filed its first enforcement action under the 23 NYCRR 500 cybersecurity regulation against First American Title Insurance, a large title insurance provider headquartered in Santa Ana, Calif …
IT Asset Management – Monitoring and Maintaining Assets
by Kyle Daun on August 6, 2020 at 3:45 PM
It has been a few months since my last blog post about IT asset management was published. Daily events are causing rapid changes that organizations are having to adapt to, leaving IT leaders asking, “how do I account for all of my equipment”? This can be accomplished in a variety of w …