Safely Disposing of Hard Drives and Other Media Formats

A recent study states that 40% of of used digital devices still contained personal information from previous owners. This should be a worrying figure for anyone who works with sensitive personal, financial, or medical information in their organization. It should be even more worrying for those who fall under security or privacy compliance requirements. The …

Safely Disposing of Hard Drives and Other Media Formats Read More »

I have anti-virus and a firewall in my small business. I’m good, right?

Most smaller businesses have relied only on anti-virus software and firewall systems for security for many years.  These have mostly worked to keep attackers and cyber criminals at bay.  But as more sophisticated threats turn attention from larger businesses, governments, and banks to smaller business, it’s time to rethink that model. Today’s threats acknowledge these …

I have anti-virus and a firewall in my small business. I’m good, right? Read More »

2017 To Do List

As we start a new year, we have a great opportunity to do so securely.  Here are a few ways to start the year off right: 1.  Train your workforce to spot ransomware (and phishing and social engineering attacks) While backups are a great way to ensure ransomware doesn’t completely cripple your company, empowering users to detect …

2017 To Do List Read More »

Security Controls

A large part of any company’s security plan if the security controls.  Security controls are a set of directives that must be followed within an organization.  For those who have compliance requirements, you are likely already subject to a set of controls such as HIPAA, PCI-DSS, NERC CIP, or others.  Because you are already required …

Security Controls Read More »

Securing a Small or Mid-Sized Business

Small and mid-sized business (SMBs) are unique in their security needs.  They have received very little attention from the security industry by anything more than a drive by hardware or software salesman.  Their uniqueness doesn’t come from any special security situation, but from size and resource availability. Most security standards, frameworks, and guidance are focused on large …

Securing a Small or Mid-Sized Business Read More »