With vendor management for supply chain security, organizations secure their supply chain to better serve customers and lower operating costs.

(more…)

Ransomware has gotten so easy, it is scary! Pull the mask off cybercriminal monsters with these tips on identifying and avoiding scams.

(more…)

Preventing bot attacks can save your business from damage to your website, systems, security, and reputation.

(more…)

Default configurations of technologies may be convenient and user-friendly, but they are rarely optimal when it comes to security. That is where these system hardening tips come in.

(more…)

An IT risk assessment finds security risks, threats, and vulnerabilities affecting technologies, IT processes, and compliance status. Identifying risks, and how to mitigate them, supports longstanding sustainability, resiliency, and agility within the IT environment.

(more…)

On December 13, 2020, Cybersecurity & Infrastructure Security Agency (CISA) issued its fifth ever Emergency Directive. The agency instructed all national networks to disconnect products from SolarWinds’ Orion. 

(more…)

Bot attacks, which use automated web requests— essentially, Internet robots— to disrupt websites, applications, APIs, and end users, sound like the subject of a dystopian horror film. Unfortunately, they’re real, and increasingly persistent. Here’s what you can do stop them.
(more…)

2021 was a year of change for IT and cybersecurity leaders.  IT leaders should review last year’s successes and failures, and adjust their strategies to keep pace with risks and trends in 2022. Here are the top 3 takeaways from 2021.

(more…)

Wearables that track health information aren’t necessarily protected by HIPAA standards. Is wearing a smart watch worth the security risk?

(more…)