IT Asset Management – Disposal of Assets
by Kyle Daun on October 21, 2020 at 1:30 PM
As we reach the end of this asset management blog series, we have discussed the need for establishing governance policies and procedures, how to acquire hardware and software for your organization, and how to monitor and upgrade assets throughout their lifecycles.
Vendor Risk Management: Third-Party Risk Analysis / Annual Review
by Andrew Paull on October 8, 2020 at 2:00 PM
We live in a world where our interactions with each other are generally benign, observed to be candid at face value, making it easy to take the assurances of success, functionality, and capability of our colleagues and acquaintances as they are meant. Unfortunately, business interacti …
VA Data Breach Exposes the Personal Info of 46,000 Veterans
by CJ Hurd on September 24, 2020 at 1:00 PM
Being hacked is unfortunately still an all too common occurrence. Even as security measures get stronger, reports of breaches and compromises of individual’s personal information do not seem to be slowing down.
Situational Awareness – How Strong Are Your Spidey Senses?
by Peter Fellini on September 17, 2020 at 3:15 PM
How aware are we of our surroundings? What is happening around us that we are not aware of? Being more cognitive of our surroundings at work and at home can bring a lot of positive results to our corporate security posture.
Elements of Quality Security and Privacy Awareness Training
by Patrick Hughes on September 3, 2020 at 3:00 PM
As information technology professionals, we often hear the term security awareness training. Most organizations know they need to be conducting continuous security awareness training, whether the goal is to check a box for a framework/regulation they must adhere to, or they genuinely …
Can the Election Be Hacked?
by Jesse Roberts on August 27, 2020 at 2:15 PM
The presidential election is less than three months away and questions revolving around the overall security of the electoral process should be on everyone’s mind. Let us discuss some areas that may be susceptible to hacking. I will be assigning a threat level based on my own professi …