A Detailed History of SOC 2 Compliance
by Rachel Hughes on July 2, 2024 at 12:30 PM
Security threats do not only come from bad actors online or suspicious links in an email. Have you considered the security threats posed by your organization’s closest entities – like vendors and partners? Third party service providers may unknowingly pose security threats to their co …
CDK Global Hit by Cyberattacks: The Impact on Auto Dealerships
by Jerry Hughes on June 27, 2024 at 2:45 PM
CDK Global, a major software-as-a-service (SaaS) provider for car dealerships, recently faced consecutive cyberattacks, severely disrupting the automotive sales and service industry. These breaches highlight the increasing sophistication of cyber threats and the widespread implication …
Cl0p’s MOVEit Attack Victim Count Continues to Climb
by Mark Plantinga on August 2, 2023 at 2:00 PM
The cyber threat landscape continues to evolve at an alarming pace, posing ever-increasing challenges to businesses, governments, and individuals. A particularly troubling development in recent months has been the dramatic rise in MOVEit attacks attributed to the Cl0p ransomware group …
A Comprehensive Guide to Data Center Outsourcing (DCO)
by Peter Fellini on July 27, 2023 at 1:00 PM
Outsourcing data storage to third-party providers is a trend gaining significant momentum across organizations worldwide. Adopting this strategy brings a plethora of benefits, including significant monetary savings, improved flexibility, and a notable decrease in operational responsib …
Using the HECVAT to Measure Vendor Risk
by Brian Kelly on September 8, 2022 at 1:00 PM
Not a day goes by without a conversation about third-party risk management. Our clients are being bombarded in all directions; asked by regulators, auditors, their clients, and customers alike to complete third-party risk assessments (SIG, CAIQ, HECVAT).
Are You Protecting Your Attack Surface?
by Kelly O’Brien on August 25, 2022 at 1:00 PM
Does your organization understand its attack surface? Gartner, Inc., a technological research and consulting firm, recently published the top trends in Cybersecurity for 2022, with attack surface expansion coming in at number one.