5 ways your business can manage security to protect sensitive client information. Losing sensitive client data, such as login credentials, credit card information, medical records, or financial reports, can have disastrous consequences for your business, from both a legal and PR standpoint. Fortunately, there are steps you can take to safeguard against these security breaches. […]
Category Archives: Security
Does your company have a Bring Your Own Device policy? Bring Your Own Device (BYOD) policies are increasingly popular among employers and employees alike. Many employees are more comfortable using their own devices, as it allows them remote access to work documents without the hassle of a second device. And from an employer perspective, BYOD […]
Time is critical in reporting a security breach. Is your business prepared? In the case of a security breach, a speedy response time is critical to protecting data. Take two important examples of security incidents: the Target hack, and Google’s recent phishing scam. In the first, Target’s failure to notice and respond to the security […]
What is multi factor authentication? Multi factor authentication is when a user must provide evidence from two or more sources to prove their identity. Typically this information should come from separate categories, such as a thing they own (a bank card), a thing they know (a password), or something they are (a finger print). A […]
Common information security breach examples and how to avoid them. It used to be that major information security hacks were the purely the stuff of Hollywood films. The government may have reason to worry, but it hardly seemed likely you are your businesses would become targets. But as security hacks of major corporations regularly make […]
How NIST 800-171 can help you establish network security protocols for your business, even if you don’t contract with the DoD. We’ve written a lot lately about NIST 800-171 and what your business can do to become compliant. But while these compliance standards are only mandatory for businesses filling federal or DoD contracts, they can […]
How to know if your business handles CUI (and what to do about it). We recently talked about the NIST 800-171 cybersecurity standards which the DoD requires all contractors and subcontractors to implement by the end of 2017. They apply to any business contracting with the DoD or the federal government, and any business which […]