Colorado Protections for Consumer Data Privacy Act - What to Know
by Sarina Resnick on September 12, 2019 at 2:02 PM
Last spring, Colorado followed the actions of several other states and countries by taking steps to enact legislation that helps consumers protect their data. The state passed the Protections for Consumer Data Privacy Act (HB18-1128). Signed into law on May 29, 2018, and taking effect …
IT Security in the Professional Sports World
by Derek Morris on August 28, 2019 at 1:02 PM
This blog will be the first in a multi-part informational blog series on professional sport team’s information technology (IT) security hurdles and the very public issues that have occurred.
How Information Security Approach Affects Organizational Culture
by Andrew Paull on July 17, 2019 at 1:00 PM
In this technological era where big data drives innovation and companies are expanding the boundaries of their offerings, workforce, and geographic locations through automation, it’s easy to lose sight of some of the more human aspects of organizational operations.
Defending From Within
by Ron Scarborough on June 26, 2018 at 10:00 AM
Hackers, Ransomware, and denial of service attacks get all of the attention when it comes to Information Security. However, you will quite often hear IT Security personnel state that the biggest threat to an organization is from within. With this in mind, if an organization’s biggest …
Information Security - Don't Just Check the Box!
by Derek Morris on June 12, 2018 at 10:00 AM
Compliance and security at times go hand in hand. In most cases, being compliant does not truly ensure you are being secure. I titled this blog “Don’t just check the box!” because the thinking that if your company can check the compliance box it will be secure enough is just not true. …
The NIST Cybersecurity Framework Functions – Respond
by Kyle Daun on June 8, 2018 at 10:00 AM
This is part 4 of our ongoing blog series on the NIST Cybersecurity Framework. To view our previous posts in this series, please see the links below: NIST Cybersecurity Framework - Overview and Identify NIST Cybersecurity Framework - Protect NIST Cybersecurity Framework - Detect After …