Telecommuting (Securely) During a Pandemic Outbreak
by Derek Morris on March 16, 2020 at 1:30 PM
Unless you live under a rock, you’ve likely seen the incessant news coverage of the Coronavirus (COVID-19). This has driven many companies to allow working from home for their staff. The technology has existed for years to allow workers that do not need to be in the office to work rem …
Microsoft Teams – The New Phishing Platform for Hackers?
by Jesse Roberts on March 13, 2020 at 1:00 PM
Many organizations are moving to cloud services for email, voice, and collaboration software. One of the major services being offered is Microsoft Teams. Teams is powerful collaboration software that allows users to share files, screen share, instant message, schedule meetings and voi …
Pandemic Planning and Tabletop Testing
by Patrick Hughes on March 10, 2020 at 3:45 PM
With the recent outbreak of the Coronavirus (COVID-19), the Centers for Disease Control and Prevention (CDC) has recommended that organizations assess their current pandemic response plans. If your organization doesn’t have a pandemic response plan in place, it is highly recommended t …
Examples of Effective Vishing Attacks
by David Bienkiewicz on March 4, 2020 at 2:00 PM
Vishing (not to be confused with phishing) is a form of social engineering that attempts to manipulate an individual to give an attacker personal information like usernames and passwords, credit card information, and social security numbers via the telephone. The attacker will call an …
IT Asset Management – Governance Policies & Procedures
by Kyle Daun on February 28, 2020 at 1:00 PM
One of the most daunting and time-consuming tasks that an IT administrator can face is logging, monitoring, and tracking assets for their organization. Depending on the size of an organization, tracking can vary and may or may not include a robust program with various tools and spread …
Stop Running from Privacy! Use the NIST Privacy Framework
by Jerry Hughes on February 19, 2020 at 1:00 PM
Take a look at your recent SOC 2 Type ll Service Organization Audit, where there are five Trust Service Criteria (Security, Confidentiality, Processing Integrity, Availability, and Privacy). How about your last Health Insurance Portability and Accountability Act (HIPPA) Audit, where t …