Browsing: Security

How to Compile a Plan of Action and Milestones

How to Compile a Plan of Action and Milestones

puzzle peices that say control strategy security regulation rules policies and guidelines

You must create a Plan of Action and Milestones to become NIST 800-171 compliant. If your business contracts or subcontracts with the Federal Government, you may have heard about the new NIST 800-171 compliance regulations. One of the key documents you need to compile for upcoming contract awards is known as a Plan of Action… read more

How to avoid a costly information security breach.

graphic showing information security symbols

Common information security breach examples and how to avoid them. It used to be that major information security hacks were the purely the stuff of Hollywood films. The government may have reason to worry, but it hardly seemed likely you are your businesses would become targets. But as security hacks of major corporations regularly make… read more

Why Server Security Updates Can Make or Break Your Business

man on tablet checking server securty

When was the last time you ran security patches on your servers? Businesses often ignore server patches or updates until they encounter issues. When it comes to server security best practices, regular server security patching is always at the top of the list. Unfortunately, this is also one of the most overlooked practices in server… read more

Does your company need an IT security audit?

padlock symbol projected above a circuit board

IT Security Audit: Why Your Company (Probably) Needs One How long has it been since your company had a comprehensive IT security audit? We’re not just talking about a simple scan of your systems, but an actual, in-depth audit. If it’s been longer than you care to remember then it’s probably time. An IT audit… read more

Is it Safe to Use Public Wi-Fi?

young african american woman sitting in cafe working on computer using public wi-fi

How to Keep Your Data Safe on Public Wi-Fi Networks Whether it’s a coffee shop, airport, or hotel, at some point, you’re bound to find yourself doing business outside of the office. Sharing files and sensitive information over the Internet is especially risky if you’re using a public Wi-Fi network. Follow these tips to keep… read more

How to Protect Your Company from Malware Attacks

A padlock over a computer panel to show security

Know Your Enemy Computer viruses: they’re annoying spammy, and seemingly everywhere you go online. You’ve probably dealt with computer viruses in the past, but what steps have you taken to protect your company from malware attacks? Malware attacks are common, and one of the biggest threats to your business security. Malware is designed to steal… read more