This article was authored by Apptega, provider of tools to simplify cybersecurity management and compliance. The word “audit” conjures dread for the never-ending questions, paperwork, and pressure it implies. Organizations that partner with security-focused IT...
DATA SECURITY
HELP+RESOURCES
Handling High-Stakes Data Security Audits
Audit. It’s a word that if not scares, at the very least, makes IT Management, the Security team, and Executives uncomfortable. When you’re doing everything you can to keep things running, the last thing you want is to have someone come in and tell you you’re...
Webinar: Navigating High-Stakes Audits
Art Provost, VP of Security Services at Filament Essential Services and a 30-year security veteran with deep experience as both the auditor and auditee, shares best practices for streamlining the collection and presentation of evidence, articulating compliance with...
Internet Scams 2022
Happy Safer Internet Day 2022! From cyberbullying to social networking to digital identity, each year Safer Internet Day aims to raise awareness of emerging online issues and current concerns. Here are some web resources that can help protect you and your loved ones...
Protip: 6 Ways to Protect School Networks from Student Hackers
It shouldn’t be a surprise that school districts are a gold mine for hackers. While the external cybercriminal seeks confidential information such as Social Security numbers for financial gain or identity fraud, the student hacker hopes to change grades, infect...
Protip: 7 Ways to Identify Phishing Emails
Are you sure that convincing email you just received from Southwest Airlines is really from Southwest Airlines? Companies and individuals are often targeted by cybercriminals using emails crafted to look like they are from a legitimate organization or financial...
1Password: To Manage Passwords
Too many passwords to remember? 1Password is all you need You’ve been given access to another application at the office, opened a new savings account, an additional email for work, joined an online retailer’s homepage….and yes, you guessed it, they all require you to...
Best of the Web: Security
This month we have plucked a few of our favorite data security articles that show you what to look out for and how to protect yourself.Seven Deadly Weaknesses of Nonprofit Security This article focuses on understanding the most common security weaknesses and the risks...