placeholder pixel image
Cybersecurity Essentials Recap

Cybersecurity Essentials Recap

In today’s business environment, cybersecurity should be a priority for all businesses—no matter the size. Over the past few months, we’ve covered each item on the Cybersecurity Essentials list, which is a great way to gauge what security measures you...
SIEM vs. EDR

SIEM vs. EDR

Now that we’ve covered Security Incident and Event Management (SIEM) and Endpoint Detection and Response (EDR) in previous videos, you might be wondering which solution is best for your business. In many cases, the answer is both. Using SIEM and EDR together can...
2022 Global Threat Report Update

2022 Global Threat Report Update

The 2022 Global Threat Report from CrowdStrike is now available, providing information on the latest vulnerabilities, security threats, and intrusion methods. The report highlights the increasing risk in three critical areas: endpoints and cloud workloads, identity,...
Identifying Digital Assets

Identifying Digital Assets

As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digital assets are a vital and valuable part of any company. However,...
Internal Policy for Data Retention

Internal Policy for Data Retention

When your business or organization experiences a breach of security or loss of data, how soon can your business get back up and running? If you are prepared enough to have backups of your data… how recent is that backup? These small details can have a big impact on...
Internal Privacy Policy

Internal Privacy Policy

One of the first things you can do when going into business (and consequently, #1 on our Cybersecurity Essentials Checklist) is to create an internal privacy policy. As the name suggests, the internal privacy policy is a written document to be shared with all...
What is “Least Privilege”?

What is “Least Privilege”?

Every good information security program is based on three essential principles: confidentiality, integrity, and availability. One of the most common-sense security methods an organization can use to fulfill these principles is the concept of “least...
Privacy PolicyTerms Of ServiceCookie Policy