Virtual Meeting Privacy & Consent
by Danielle Corsa on July 22, 2020 at 3:30 PM
Virtual workplace meetings are fantastic – a true time and money saver. No makeup, no pants, no shoes, no driving, no hassle! Big props to technology on that one.
Security Culture Through the Eyes of a Young Marine
by Ron Scarborough on May 27, 2020 at 1:00 PM
Many years ago, I was enlisted in the Marine Corps. As a young Marine I was given the opportunity to take part in the Marine Security Guard program. I received my marching orders and was off to Quantico, Virginia, for my training. Afterwards I was shipped off to the United States emba …
IT Asset Management – Acquisition of Assets
by Kyle Daun on May 14, 2020 at 1:15 PM
In part one of this IT asset management blog series, we discussed governance policies and procedures. In this second part to the blog series, we will discuss the process for acquisition of assets from reputable and vetted vendors. A lot has happened since part one was written, which a …
Continuous Vulnerability Scanning Within Your Remote Network
by Danielle Corsa on May 7, 2020 at 1:45 PM
By now, you are likely tired of reading similar blogs and watching the same webinars about how the workforce is scrambling to set up secure remote workstations for the employees they have remaining. The words “threat” and “risk” have been used continuously to inspire dread and instill …
COVID-19: Is Management Asking the Right Questions?
by Jerry Hughes on April 24, 2020 at 4:00 PM
What if you are the owner or manager of a business in today’s world? A few weeks ago, our world was turned upside down – to say the least. Management’s focus shifted from business as usual to figuring out how to keep employees safe and company doors open for business (in-person or vir …
9 Easy Steps to Create Strong Passwords
by Nicholas Foisy on April 15, 2020 at 4:30 PM
Passwords serve as the gatekeeper to an organization’s data and systems, keeping out unauthorized users and only allowing the right people to enter. The strength of an organization’s passwords can often be the deciding factor to whether they suffer a breach or data disaster.