placeholder pixel image
Identifying Digital Assets

Identifying Digital Assets

As the world becomes increasingly digital, businesses are relying on more and more digital assets to operate. From website content and social media accounts to customer data and company records, digital assets are a vital and valuable part of any company. However,...
Internal Policy for Data Retention

Internal Policy for Data Retention

When your business or organization experiences a breach of security or loss of data, how soon can your business get back up and running? If you are prepared enough to have backups of your data… how recent is that backup? These small details can have a big impact on...
Internal Privacy Policy

Internal Privacy Policy

One of the first things you can do when going into business (and consequently, #1 on our Cybersecurity Essentials Checklist) is to create an internal privacy policy. As the name suggests, the internal privacy policy is a written document to be shared with all...
What is “Least Privilege”?

What is “Least Privilege”?

Every good information security program is based on three essential principles: confidentiality, integrity, and availability. One of the most common-sense security methods an organization can use to fulfill these principles is the concept of “least...
Patch Management Plan 

Patch Management Plan 

Does your business have a patch management plan? If you answered “no” you’re not alone. Most workplaces leave it up to fate, rely on built-in failsafe features (like when your computer automatically turns off and updates), or just let employees...
Hackers Are Using NFT Excitement To Trick Users

Hackers Are Using NFT Excitement To Trick Users

Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage.  Everyone is talking about them, and many are excited about them.  Hackers have been quick to take advantage of that fact, and the Fortinet researchers...
Privacy PolicyTerms Of ServiceCookie Policy