Posted On Wednesday, January 31, 2018
The best defense is a good offense. Take an active approach to information security by assessing security program maturity.
Posted On Sunday, December 24, 2017
Everyone has a role to play in maintaining and enhancing cyber security across the enterprise. Here are 5 easy ways staff members can step up their game to keep critical data safe.
Posted On Friday, November 24, 2017
Online shopping brings security risks to those who don’t take proper precautions. Here are 5 tips to keep your private information safe this holiday season.
Posted On Tuesday, October 31, 2017
October was National Cyber Security Awareness Month, but cyber hygiene is always in style. Read our infographic for a summary of this year's topics and tips.
Posted On Friday, September 29, 2017
At Securance, we care about more than the security of networks and systems. Here's what we're doing to help Irma victims across the state of Florida rebuild their lives in the aftermath of the hurricane.
Posted On Friday, September 22, 2017
Now that Hurricanes Harvey and Irma have passed, another storm is brewing: hurricane-related phishing scams. Here's how to protect yourself — and your wallet.
Posted On Wednesday, August 30, 2017
By now, you've probably heard of the NIST Cybersecurity Framework. What is the NIST Framework, and is it a fit for your organization? Read on!
Posted On Monday, July 31, 2017
Incident response plans focus on restoring damaged IT systems, but it's not just IT staff who are involved in responding to security incidents. Successfully containing, removing and recovering from an incident requires cooperation between business units, IT, legal counsel, human resources, public relations, and security and audit groups. Read on for our recommendations to achieve stakeholder and employee buy-in early on in the planning process.
Posted On Wednesday, July 05, 2017
One of the newest members of the ISO 27000 family, ISO 27018 covers protection of personally identifiable information (PII) in public cloud environments. For cloud service providers looking to enhance security and win over customers, aligning with ISO 27018 may be worth the effort.
Posted On Wednesday, May 24, 2017
While a physical breach may not sound as threatening as ransomware or a denial of service attack, unauthorized intruders can wreak havoc on a data center, resulting in data losses, downtime and, potentially, a damaged reputation and diminished customer base. Read on for proven ways to protect your data center, systems and equipment.