Don’t Let Hackers Win: How to Keep Your Applications Secure

Application security is a critical component of any company’s cybersecurity strategy. It is the process of identifying, identifying and mitigating risks and vulnerabilities in software applications and systems. In today’s digital age, where companies rely heavily on technology and the internet to conduct business, application security is needed more than ever to protect sensitive data, …

Don’t Let Hackers Win: How to Keep Your Applications Secure Read More »

Don’t be a Risky Business -Why Vendor Risk Assessments are Important

The What: Vendor risk assessments are an important part of managing the security and compliance of a company’s information technology systems. These assessments help organizations identify and mitigate risks associated with the use of third-party vendors and their products and services. In this article, we will discuss the reasons why a company should conduct vendor …

Don’t be a Risky Business -Why Vendor Risk Assessments are Important Read More »

Mini PCs : Lifewire

How are mini PC processors different from regular PCs? Which users should opt for a mini PC? How can you keep a mini PC safe?

Sammy spoke to Lifewire about MiniPC’s and their usefulness in enterprise and personal spaces.

Image of Hooded Figure with Green Code Around Them

6 Key Security Steps Companies Should Take Right Now

In this episode, Sammy provides valuable insights by sharing six crucial steps that businesses can take to safeguard their operations, as well as practical and fundamental measures to secure personal and professional environments.

Burnout in the Cybersecurity Industry

The cybersecurity industry faces a high burnout because of the endless stream of threats and the passionate professional who feels they have to manage it all.

Disappearing Photos : Lifewire

Are your temporary images really temporary or is there a way to keep them forever?

Sammy spoke with Lifewire about how these images can still be retained.

Link to the article

Data Security Record Nation

Data Security : Record Nation

Taking care of the hardware that contains your data makes logical sense. However, many companies are still losing their data on a daily basis

Sammy had a great discussion with Andy Breslow from Record Nation about it.

Data Privacy And Cybersecurity

Data Privacy And Cybersecurity

Plan in advance. Assign a value to your various categories or tiers of information (digital assets) and keep your asset inventory updated. That way, if your customer data has been breached, you know the dollar value associated with that data and you have a plan to prioritize, recover and restore operations.

PCI Compliance On A Penny

PCI Compliance On A Penny

We recently worked with a client to build a PCI compliance infrastructure in the cloud. Here are some key takeaways from that experience. Becoming PCI compliant is often perceived as a daunting task, as there are approximately 200 requirements that an organization needs to adhere to. However, just like Pareto’s 80-20 principle, here are some …

PCI Compliance On A Penny Read More »

Home Office Network Segmentation

Home Office Network Segmentation

Most of us who are working from home have a flat network that allows free co-mingling of malicious traffic with clean traffic. In the good old days when we used to commute to work, we would have noticed that payroll systems are isolated from user workstations that are isolated from production servers. The flat network …

Home Office Network Segmentation Read More »