Category Archives: Security

cybersecurity, lock on keyboard

5 Client Data Protection Tips to Keep Your Customers Safe

5 ways your business can manage security to protect sensitive client information. Losing sensitive client data, such as login credentials, credit card information, medical records, or financial reports, can have disastrous consequences for your business, from both a legal and PR standpoint. Fortunately, there are steps you can take to safeguard against these security breaches. […]
woman at a computer in a coffee shop

Should Your Business Have a BYOD Policy?

Does your company have a Bring Your Own Device policy? Bring Your Own Device (BYOD) policies are increasingly popular among employers and employees alike. Many employees are more comfortable using their own devices, as it allows them remote access to work documents without the hassle of a second device. And from an employer perspective, BYOD […]
graphic of lock dissolving into zeros and ones.

How to create an Incident Response Plan for your business.

Time is critical in reporting a security breach. Is your business prepared? In the case of a security breach, a speedy response time is critical to protecting data. Take two important examples of security incidents: the Target hack, and Google’s recent phishing scam. In the first, Target’s failure to notice and respond to the security […]
An illustration of a computer and a cell phone showing how multi factor authentication can be used to log in to an account.

How Multi Factor Authentication Protects Information Security

What is multi factor authentication? Multi factor authentication is when a user must provide evidence from two or more sources to prove their identity. Typically this information should come from separate categories, such as a thing they own (a bank card), a thing they know (a password), or something they are (a finger print). A […]
network security Brighton

Does your business have network security protocols?

How NIST 800-171 can help you establish network security protocols for your business, even if you don’t contract with the DoD. We’ve written a lot lately about NIST 800-171 and what your business can do to become compliant. But while these compliance standards are only mandatory for businesses filling federal or DoD contracts, they can […]
files showing examples of what controlled unclassified information consists of

Controlled Unclassified Information consists of… what exactly?

How to know if your business handles CUI (and what to do about it). We recently talked about the NIST 800-171 cybersecurity standards which the DoD requires all contractors and subcontractors to implement by the end of 2017. They apply to any business contracting with the DoD or the federal government, and any business which […]